leekthehack

13 Followers
21 Following
122 Posts

VulnWatch Monday: CVE-2026-3611 ๐Ÿ”“

Gjoko Krstic, from Zero Science Lab reported a maximum-severity vulnerability in Honeywell's IQ4x building management controller.

The flaw was publicly disclosed by ICS Cert and is tracked as CVE-2026-3611.

๐Ÿ”Ž With no user module configured, security is disabled by design and the system operates under a System Guest (level 100) context, granting read/write privileges to any party able to reach the HTTP interface.

โš™๏ธ Authentication controls are only enforced after a web user is created via U.htm, which dynamically enables the user module. Because this function is accessible prior to authentication, a remote user can create a new account with administrative read/write permissions enabling the user module and imposing authentication under attacker-controlled credentials. This action can effectively lock legitimate operators out of local and web-based configuration and administration.

๐Ÿ”ง According to CISA, Honeywell is aware of the issue, but has not released a fix. For more information, users are urged to contact Honeywell directly.

โš ๏ธ CISA advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-26-069-03
๐Ÿ’พ View CSAF: https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-069-03.json

๐‚๐ซ๐ข๐ญ๐ข๐œ๐š๐ฅ ๐™๐ž๐ซ๐จ-๐‚๐ฅ๐ข๐œ๐ค ๐…๐ฅ๐š๐ฐ ๐ข๐ง ๐ง๐Ÿ–๐ง ๐€๐ฅ๐ฅ๐จ๐ฐ๐ฌ ๐…๐ฎ๐ฅ๐ฅ ๐’๐ž๐ซ๐ฏ๐ž๐ซ ๐‚๐จ๐ฆ๐ฉ๐ซ๐จ๐ฆ๐ข๐ฌ๐ž

Researchers from Pillar Security have found two new critical vulnerabilities in self-hosted and cloud n8n deployments.

n8n is a popular open-source workflow automation platform powering hundreds of thousands of enterprise AI systems worldwide.

One of the flaws, tracked as CVE-2026-27493, can lead to full takeover of a server without the target clicking on anything and without the attacker needing to be authenticated.

๐Ÿ”งFix? n8n cloud users should have already benefitted from automated fixes.

People self-hosting n8n instances are urged to update to versions 2.10.1, 2.9.3 or 1.123.22 of n8n, depending on their release channel.

Pillar Security also recommended users to rotate all stored credentials if a vulnerable workflow is found in their n8n environment.

https://www.infosecurity-magazine.com/news/critical-zeroclick-flaw-n8n-pillar/

๐–๐ก๐š๐ญ ๐‚๐ˆ๐’๐Ž๐ฌ ๐’๐ก๐จ๐ฎ๐ฅ๐ ๐Š๐ง๐จ๐ฐ (๐€๐ง๐ ๐ƒ๐จ) ๐€๐›๐จ๐ฎ๐ญ ๐Ž๐ฉ๐ž๐ง๐‚๐ฅ๐š๐ฐ

OpenClaw has exploded onto the scene and govts are already slamming on the brakes. I spoke to experts to explore what CISOs should do to contain its vulnerabilities.

https://www.infosecurity-magazine.com/news-features/what-cisos-should-know-and-do/

What CISOs Should Know (And Do) About OpenClaw

Infosecurity spoke to several experts to explore what CISOs should do to contain the viral AI agent toolโ€™s security vulnerabilities

Infosecurity Magazine
Exclusive Interview with OpenClawโ€™s Security Advisor

Infosecurity Magazine Podcast ยท Episode

Spotify

๐„๐ฑ๐œ๐ฅ๐ฎ๐ฌ๐ข๐ฏ๐ž ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐ฐ๐ข๐ญ๐ก ๐Ž๐ฉ๐ž๐ง๐‚๐ฅ๐š๐ฐ'๐ฌ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐€๐๐ฏ๐ข๐ฌ๐จ๐ซ

@openclaw's weak spots have not gone unnoticed and Jamieson O'Reilly was among the first to call them out. Now, heโ€™s been appointed its security representative.

๐ŸŽง https://www.infosecurity-magazine.com/podcasts/exclusive-interview-openclaw/

In a soon-to-be released interview, Jamieson O'Reilly, OpenClawโ€™s security advisor, warned that we need to develop more ways to โ€œscan AI toolsโ€ for detecting โ€œhuman-language malware.โ€

With the Promptfoo acquisition, OpenAI now wants to do just that.

https://www.infosecurity-magazine.com/news/openai-promptfoo-deal-agentic-ai/

VulnWatch Monday: CVE-2026-27944 ๐Ÿ”“

A critical vulnerability in Nginx UI allows unauthenticated attackers to download and decrypt full system backups. It affects all versions before 2.3.2.

โš™๏ธ The flaw is caused by two security failures: the /api/backup endpoint lacks authentication, and the system exposes the Base64โ€‘encoded AESโ€‘256 encryption key and IV in the X-Backup-Security HTTP header.

Attackers can simply send a GET request to download encrypted backup archives and immediately decrypt them using the leaked keys.

๐Ÿ”“ Decrypted backups may reveal user credentials (database.db), configuration files (app.ini), SSL certificates, private keys and Nginx configurations, enabling attackers to take over the Nginx UI console, intercept traffic or move deeper into the network.

A public Python PoC demonstrating the exploit is already available.

๐Ÿ”ง Fix? Yes: Nginx UI version 2.3.3

๐Ÿ”Ž GitHub advisory: https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-g9w5-qffc-6762
๐Ÿ’พ View JSON: https://cveawg.mitre.org/api/cve/CVE-2026-27944

VulnWatch Monday: CVE-2025-71210 ๐Ÿ”“

Trend Micro has issued patches addressing several vulnerabilities in Apex One, with severity levels ranging from high to critical.

The flaws, identified as CVEโ€‘2025โ€‘71210 through CVEโ€‘2025โ€‘71217, carry CVSS v3 scores between 7.2 and 9.8.

Some of the issues impact the management console and could potentially allow remote code execution.

According to a February 2026 advisory, the affected products include Apex One 2019 (on-premises) for Windows and Apex One as a Service, also known as "Trend Vision One Endpoint โ€“ Standard Endpoint Protection" on Windows.

๐Ÿ”ง Fix? Trend Micro advises customers to upgrade to the most recent available builds - CP Build 14136 and Security Agent Build 14.0.20315 -, noting that earlier patches may not fully resolve all aspects of the vulnerabilities.

๐Ÿ”Ž Trend Micro advisory: https://success.trendmicro.com/en-US/solution/KA-0022458

Le rรฉgulateur russe des tรฉlรฉcoms, Roskomnadzor, a dรฉsormais banni 469 services VPN, dโ€™aprรจs lโ€™agence de presse russe Ria Novosti.

Courts-circuits | 23 fรฉvrier-1er mars 2026

https://coupecircuit.substack.com/p/469-vpn-bloques-en-russie-et-ce-nest

Comment le blackout internet en Iran redessine le rรดle du secteur privรฉ

๐Ÿ‡ฎ๐Ÿ‡ท La coupure internet en Iran a mis en avant le rรดle du secteur privรฉ dans la censure numรฉrique.

Iran : analyse dโ€™une coupure internet sans prรฉcรฉdent - partie 2/3

https://coupecircuit.substack.com/p/comment-le-blackout-internet-en-iran