Harry Sintonen

@harrysintonen@infosec.exchange
1.3K Followers
212 Following
2.2K Posts
Infosec consultant at REVƎЯSEC https://reversec.com - Coding, Research + various other interests
PGPhttps://sintonen.fi/pgpkey.txt
Researchhttps://sintonen.fi/advisories/
Githubhttps://github.com/piru

Cisco have found an in the wild zero day in Cisco Secure Email Gateway And Cisco Secure Email and Web Manager being used to backdoor appliances for later access.

Now CVE-2025-20393.

No patch available.

They recommend nuking boxes and reinstalling from scratch if you opened spam quarantine port (6025 and 7025) to internet, and closing port.

It is unclear how long boxes have been backdoored for.

Ports aren't scanned by @shodan yet so scope isn't known.

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-attack-N9bf4

Cisco Security Advisory: Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager

On December 10, Cisco became aware of a new cyberattack campaign targeting a limited subset of appliances with certain ports open to the internet that are running Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager. This attack allows the threat actors to execute arbitrary commands with root privileges on the underlying operating system of an affected appliance. The ongoing investigation has revealed evidence of a persistence mechanism planted by the threat actors to maintain a degree of control over compromised appliances. Cisco strongly recommends that customers follow the guidance provided in the Recommendations section of this advisory to assess exposure and mitigate risks.  Cisco Talos discussed these attacks in the blog post UAT-9686 actively targets Cisco Secure Email Gateway and Secure Email and Web Manager. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-attack-N9bf4

Cisco
httpget/httpget-0.2.c at master · curl/httpget

Historic versions of httpget source code. Contribute to curl/httpget development by creating an account on GitHub.

GitHub

A privilege escalation in Dropbear (CVE-2025-14282) allows any authenticated user to run arbitrary commands as root. The vulnerability affects versions 2024.84 to 2025.88. Dropbear release 2025.89 fixes the vulnerability.

A mitigation is to run dropbear without unix socket forwarding by adding the -j option.

https://www.openwall.com/lists/oss-security/2025/12/16/2

#CVE_2025_14282 #infosec #cybersecurity

oss-security - Dropbear 2025.89 fixes privilege escalation, CVE-2025-14282

Here's the findkey code:

#include <stdio.h>
#include <string.h>

int main(int argc, char **argv)
{
FILE *fclear, *fcipher;
struct {
char known;
unsigned char ch;
} key[65536];
int minkeysize = 0;
int totalknown = 0;
int i;

if (argc < 3)
{
printf("%s: clearfile cipherfile [keyout]\n", argv[0]);
return 1;
}

fclear = fopen(argv[1], "rb");
if (!fclear)
{
perror(argv[1]);
return 1;
}
fcipher = fopen(argv[2], "rb");
if (!fcipher)
{
perror(argv[2]);
return 1;
}

memset(key, 0, sizeof(key));

for (;;)
{
unsigned int idx;
int clr = fgetc(fclear);
int c1 = fgetc(fcipher);
int c2 = fgetc(fcipher);
if (clr == -1 || c1 == -1 || c2 == -1)
break;
#if BIG_ENDIAN
idx = (((unsigned char) c1) << 8) | (unsigned char) c2;
#else
idx = (((unsigned char) c2) << 8) | (unsigned char) c1;
#endif

if (idx + 1 > minkeysize)
minkeysize = idx + 1;

if (!key[idx].known)
{
totalknown++;
key[idx].known = 1;
key[idx].ch = (unsigned char) clr;
}
}
fclose(fcipher);
fclose(fclear);

printf("keyfile size is at least %d bytes, total %d known keyfile bytes:\n",
minkeysize, totalknown);
for (i = 0; i < minkeysize; i++)
{
if (i % 16 == 0)
printf("%04x: ", i);
if (key[i].known)
printf(" %02x", key[i].ch);
else
printf(" ??");
if (i % 16 == 15)
printf("\n");
}
if (i % 16)
printf("\n");

if (argc == 4)
{
FILE *out = fopen(argv[3], "wb");
if (!out)
{
perror(argv[3]);
return 1;
}
for (i = 0; i < minkeysize; i++)
{
fputc(key[i].ch, out);
}
fclose(out);
}

return 0;
}

It seems people are now churning out fake encryption schemes generated with large language models: https://zoscii.com/why-en.html

Checking out the code, we see that this is essentially a one-time pad. If the key is reused, the encryption is easily defeated. Let's assume the attacker has the ability to observe a known plaintext as ciphertext (chosen-plaintext attack).

1. Generate a random key and encrypt a secret message with it:

$ dd if=/dev/random of=secretkey count=8
$ echo "This is a secret message" > secretmessage.txt
$ zencode secretkey secretmessage.txt secretmessage.enc

2. Implement chosen plaintext attack and recover the encryption key:

$ perl -e 'for($i=0;$i<256;$i++){print chr($i)x65536}' > chosenplaintext
$ zencode secretkey chosenplaintext chosenplaintext.enc
$ rm secretkey
$ ./findkey chosenplaintext chosenplaintext.enc recovered-secretkey

3. Decrypt any message encrypted with the secretkey:

$ zdecode recovered-secretkey secretmessage.enc recovered-secretmessage.txt
$ cat recovered-secretmessage.txt
This is a secret message
$

I do not know if the author of this scheme is outright malicious or just fooled into believing what the LLM is telling him. He did, however, have a kickstarter for 180k AUD earlier that failed to reach its goal.

#llm #enshittification #encryption #cryptography

ZOSCII: The Security Paradigm That Makes Encryption Obsolete

Another reason to dislike systemd: libc6 update crashed systemd in a way that the only way to recover was to reboot.

2025-12-13T15:24:30.878173+00:00 asus kernel: systemd[1]: segfault at 63 ip 00007fd402653c4e sp 00007ffd8460a980 error 4 in libc.so.6[53c4e,7fd402628000+168000] likely on CPU 15 (core 3, socket 0)
2025-12-13T15:24:30.878374+00:00 asus systemd[1]: Caught <SEGV>.
2025-12-13T15:24:30.907258+00:00 asus systemd[1]: Caught <SEGV>, dumped core as pid 573573.
2025-12-13T15:24:30.907477+00:00 asus systemd[1]: Freezing execution.

After this point any operation that would require systemd just outright fail or hang.

@fennix Oh, indeed. I missed that you actually had just 10 hours (in 4 day window). Will have to correct that...
I'm well aware that Kali Linux does have more than just "nmap", but my point was to underline that while Kali Linux is great collection of tools, it doesn't replace actual proper network scanner tool.

After glancing over the "Comparing AI Agents to Cybersecurity Professionals in Real-World Penetration Testing" [1] from Justin W. Lin et al., I have some observations:

First, I must conclude that the results from the Artemis tool are quite impressive, especially considering the short amount of time the tool spent on the target.

However, 10 hours (in a window of four days) is woefully short time for an ~8000 host network penetration test. This was also acknowledged by the authors. The short amount of time gives AI-based automation an edge as it will generally have better breadth in a short amount of time. Humans, on the other hand have to balance the focus between accurate discovery and attempts to target on the discovered hosts. Humans are not best at scheduling important tasks under time pressure. Given enough time, I believe most of the human participants would have found a lot more vulnerabilities. This is why it is important to scope projects correctly. Spending just mere 10 hours on a monumental task like this will give shallow results (AI or not). Generally, an asymmetry exists where real-world attackers have a lot more time to spend on the target than defenders.

From the description, it seems that the human participants were limited to a base Kali Linux install in the tooling. This is like giving humans a spade and an axe (nmap) rather than an excavator for building a house. Doing a manual assessment to ~8000 hosts on a network with nmap and plain Kali Linux is painful, especially if you have just 10 hours.

If the idea is to produce the most value for the client (as mentioned in the instructions "Focus on what you would do to give a client the best value"), I would have told the client that the most value would likely be gotten by performing a threat modelling exercise to identify the highest threats and then plan actions to take to mitigate those rather than perform a haphazard scan of the network. That network scan will result in some findings, and those can be fixed, which is of course good. While this has some value, too, in the long run, planning actions that have more fundamental impact on security are likely more valuable.

If the client had still insisted on doing a really tight assessment on scanning ~8,000 host networks, I would have employed some good network scanner that does the discovery and service identification parts. Out of these results, I would then focus on producing a report that represents the findings well, includes a proper executive summary highlighting more high-level strategic plans on how to improve the network security. Any remaining time (likely just a couple of hours maximum) would have been spent on manually testing some of the most interesting targets pointed out by the scanner.

Now, which is more valuable to the client is up for debate. However, I think the media reporting that "AI hackers are coming dangerously close to beating humans" is outright misleading.

Hackers will use the available tooling for the grunt work, be it AI or otherwise. The real value comes from interpreting the tool results and distilling them into a strategic, actionable plan for the client.

1) https://arxiv.org/pdf/2512.09882

#cybersecurity #infosec #thoughtoftheday

⚠️ Scam alert: if anyone ever asks you to "temporarily change" the email address on your Mastodon account, DO NOT DO THIS.

There is currently a scammer posing as a server admin telling people to temporarily change their Mastodon account's email to an address supplied by the scammer. This is a scam, don't do it.

Real admins will NEVER ask you to do this.

You can see examples of this scam in the thread at https://ohai.social/@redsad/115708030185038699

(Thanks @markwyner for the warning about this! 🙏 )

#FediTips

captain acab :antifa: (@redsad@ohai.social)

Attached: 1 image is this for real? someone said they accidentally reported my account and said to contact this person now they say they want me to change my email address edit: confirmed scammer. do not respond to a text like this

ohai.social