Ron Bowes

@iagox86@infosec.exchange
1.6K Followers
376 Following
1.6K Posts
GreyNoise - NoiseFest at BlackHat 2025

Join us for NoiseFest at BlackHat/DEFCON on Thursday, August 7th. Enjoy drinks, snacks, and engaging conversations with your peers. RSVP now!

More on the Langflow vuln ( CVE-2025-3248 ). In case you haven't followed it, it's hilarious. Literally rawdogging input to exec(). LMAO. People are going to keep trusting this shit.

Go hack more AI shit.

https://www.offsec.com/blog/cve-2025-3248/

#threatIntel

CVE-2025-3248 – Unauthenticated Remote Code Execution in Langflow via Insecure Python exec Usage

CVE-2025-3248 is a critical RCE vulnerability in Langflow that allows unauthenticated attackers to execute arbitrary Python code via unsanitized input to exec(). Learn how it works and how to protect your system.

OffSec
Sorry, I looked it up and Flame is 13 years old, not 20!
Of all things for Akamai to flag, it's hilarious that they're mad about a .sys file associated with 20yr old malware

New GreyNoise Labs research: CVE-2025-4748

Our team demonstrates how path traversal via zip archives can be used to achieve file write and code execution against Erlang OTP environments, exploiting CVE-2025-4748. This technique leverages the zip:unzip function when untrusted zip files are extracted.

Read the full technical breakdown here: https://www.labs.greynoise.io/grimoire/2025-06-17-erlang-zip/

#Cybersecurity #ThreatIntel #GreyNoise #Erlang

Exploiting Erlang OTP with Zip files: CVE-2025-4748 – GreyNoise Labs

Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in Erlang OTP (stdlib modules) allows Absolute Path Traversal, File Manipulation

GreyNoise Labs

The CVE lists the CVSS assessment as a sev:MED here.

sev:MED 5.3 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

A path traversal vulnerability exists in the file dropoff functionality of ZendTo versions 6.15-7 and prior. This could allow a remote, authenticated attacker to retrieve the files of other ZendTo users, retrieve files on the host system, or cause a denial of service.

Retrieving the files of other users does not seem like VC:L. And a DoS does not seem like VA:L. But IDK, I'm just a random crow on the Internet.

https://nvd.nist.gov/vuln/detail/CVE-2025-34508

NVD - CVE-2025-34508

GreyNoise has observed exploit attempts targeting CVE-2023-28771 — an RCE vuln affecting Zyxel devices. Full analysis + malicious IPs

🔗https://www.greynoise.io/blog/exploit-attempts-targeting-zyxel-cve-2023-28771

#Cybersecurity #ThreatIntel #Vulnerabilities #GreyNoise

GreyNoise Observes Exploit Attempts Targeting Zyxel CVE-2023-28771

‍On June 16, GreyNoise observed exploit attempts targeting CVE-2023-28771 — a remote code execution vulnerability affecting Zyxel Internet Key Exchange (IKE) packet decoders over UDP port 500.

Have interesting insights on Suricata?
Share them at #SuriCon2025! Join industry, open-source, academia, and research professionals passionate about Suricata and network threat hunting, apply today to talk at #SuriCon2025.

📣 There's still time! Submit your fabulous proposal today!

#Suricata #CallForTalks

A little help goes a looooooong way

It's not the sorta stuff I normally post about, but I just wanted to share this book written by a friend of mine from a local magic club: https://a.co/d/4qlND9h

#magic