leekthehack

14 Followers
22 Following
123 Posts

VulnWatch Monday: CVE-2026-22172 ๐Ÿ”“

๐Ÿฆž Yekai Chen (aka LUOYEcode) has detected a critical vulnerability affecting OpenClaw versions prior to 2026.3.12.

๐Ÿ”ง Fix in OpenClaw 2026.3.12.

๐Ÿ”Ž GitHub advisory: https://github.com/openclaw/openclaw/security/advisories/GHSA-rqpp-rjj8-7wv8
๐Ÿž VulnCheck advisory: https://www.vulncheck.com/advisories/openclaw-scope-elevation-in-websocket-shared-auth-connections
๐Ÿ’พ View JSON: https://cveawg.mitre.org/api/cve/CVE-2026-22172

VulnWatch Monday: CVE-2026-3611 ๐Ÿ”“

Gjoko Krstic, from Zero Science Lab reported a maximum-severity vulnerability in Honeywell's IQ4x building management controller.

The flaw was publicly disclosed by ICS Cert and is tracked as CVE-2026-3611.

๐Ÿ”Ž With no user module configured, security is disabled by design and the system operates under a System Guest (level 100) context, granting read/write privileges to any party able to reach the HTTP interface.

โš™๏ธ Authentication controls are only enforced after a web user is created via U.htm, which dynamically enables the user module. Because this function is accessible prior to authentication, a remote user can create a new account with administrative read/write permissions enabling the user module and imposing authentication under attacker-controlled credentials. This action can effectively lock legitimate operators out of local and web-based configuration and administration.

๐Ÿ”ง According to CISA, Honeywell is aware of the issue, but has not released a fix. For more information, users are urged to contact Honeywell directly.

โš ๏ธ CISA advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-26-069-03
๐Ÿ’พ View CSAF: https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-069-03.json

๐‚๐ซ๐ข๐ญ๐ข๐œ๐š๐ฅ ๐™๐ž๐ซ๐จ-๐‚๐ฅ๐ข๐œ๐ค ๐…๐ฅ๐š๐ฐ ๐ข๐ง ๐ง๐Ÿ–๐ง ๐€๐ฅ๐ฅ๐จ๐ฐ๐ฌ ๐…๐ฎ๐ฅ๐ฅ ๐’๐ž๐ซ๐ฏ๐ž๐ซ ๐‚๐จ๐ฆ๐ฉ๐ซ๐จ๐ฆ๐ข๐ฌ๐ž

Researchers from Pillar Security have found two new critical vulnerabilities in self-hosted and cloud n8n deployments.

n8n is a popular open-source workflow automation platform powering hundreds of thousands of enterprise AI systems worldwide.

One of the flaws, tracked as CVE-2026-27493, can lead to full takeover of a server without the target clicking on anything and without the attacker needing to be authenticated.

๐Ÿ”งFix? n8n cloud users should have already benefitted from automated fixes.

People self-hosting n8n instances are urged to update to versions 2.10.1, 2.9.3 or 1.123.22 of n8n, depending on their release channel.

Pillar Security also recommended users to rotate all stored credentials if a vulnerable workflow is found in their n8n environment.

https://www.infosecurity-magazine.com/news/critical-zeroclick-flaw-n8n-pillar/

๐„๐ฑ๐œ๐ฅ๐ฎ๐ฌ๐ข๐ฏ๐ž ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐ฐ๐ข๐ญ๐ก ๐Ž๐ฉ๐ž๐ง๐‚๐ฅ๐š๐ฐ'๐ฌ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐€๐๐ฏ๐ข๐ฌ๐จ๐ซ

@openclaw's weak spots have not gone unnoticed and Jamieson O'Reilly was among the first to call them out. Now, heโ€™s been appointed its security representative.

๐ŸŽง https://www.infosecurity-magazine.com/podcasts/exclusive-interview-openclaw/

In a soon-to-be released interview, Jamieson O'Reilly, OpenClawโ€™s security advisor, warned that we need to develop more ways to โ€œscan AI toolsโ€ for detecting โ€œhuman-language malware.โ€

With the Promptfoo acquisition, OpenAI now wants to do just that.

https://www.infosecurity-magazine.com/news/openai-promptfoo-deal-agentic-ai/

VulnWatch Monday: CVE-2026-27944 ๐Ÿ”“

A critical vulnerability in Nginx UI allows unauthenticated attackers to download and decrypt full system backups. It affects all versions before 2.3.2.

โš™๏ธ The flaw is caused by two security failures: the /api/backup endpoint lacks authentication, and the system exposes the Base64โ€‘encoded AESโ€‘256 encryption key and IV in the X-Backup-Security HTTP header.

Attackers can simply send a GET request to download encrypted backup archives and immediately decrypt them using the leaked keys.

๐Ÿ”“ Decrypted backups may reveal user credentials (database.db), configuration files (app.ini), SSL certificates, private keys and Nginx configurations, enabling attackers to take over the Nginx UI console, intercept traffic or move deeper into the network.

A public Python PoC demonstrating the exploit is already available.

๐Ÿ”ง Fix? Yes: Nginx UI version 2.3.3

๐Ÿ”Ž GitHub advisory: https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-g9w5-qffc-6762
๐Ÿ’พ View JSON: https://cveawg.mitre.org/api/cve/CVE-2026-27944

VulnWatch Monday: CVE-2025-71210 ๐Ÿ”“

Trend Micro has issued patches addressing several vulnerabilities in Apex One, with severity levels ranging from high to critical.

The flaws, identified as CVEโ€‘2025โ€‘71210 through CVEโ€‘2025โ€‘71217, carry CVSS v3 scores between 7.2 and 9.8.

Some of the issues impact the management console and could potentially allow remote code execution.

According to a February 2026 advisory, the affected products include Apex One 2019 (on-premises) for Windows and Apex One as a Service, also known as "Trend Vision One Endpoint โ€“ Standard Endpoint Protection" on Windows.

๐Ÿ”ง Fix? Trend Micro advises customers to upgrade to the most recent available builds - CP Build 14136 and Security Agent Build 14.0.20315 -, noting that earlier patches may not fully resolve all aspects of the vulnerabilities.

๐Ÿ”Ž Trend Micro advisory: https://success.trendmicro.com/en-US/solution/KA-0022458

๐…๐ฅ๐š๐ฐ๐ฌ ๐ข๐ง ๐๐จ๐ฉ๐ฎ๐ฅ๐š๐ซ ๐’๐จ๐Ÿ๐ญ๐ฐ๐š๐ซ๐ž ๐ƒ๐ž๐ฏ๐ž๐ฅ๐จ๐ฉ๐ฆ๐ž๐ง๐ญ ๐€๐ฉ๐ฉ ๐„๐ฑ๐ญ๐ž๐ง๐ฌ๐ข๐จ๐ง๐ฌ ๐€๐ฅ๐ฅ๐จ๐ฐ ๐ƒ๐š๐ญ๐š ๐„๐ฑ๐Ÿ๐ข๐ฅ๐ญ๐ซ๐š๐ญ๐ข๐จ๐ง

Researchers at OX Security have detected four vulnerabilities in three of the most popular IDEs that could lead to cyber-attacks.The four flaws include two high-severity and one critical, affecting Microsoft VS Code.

These vulnerabilities also impact Cursor and Windsurf, two forks of VS Code that provide AI-assisted software development tools (aka โ€˜vibe codingโ€™ platforms).

One of them, CVE-2025-65717, is a vulnerability in the Live Server extension for VS Code โ€“ with over 72 million downloads โ€“ that allows a remote, unauthenticated attacker to exfiltrate files from a developerโ€™s local machine. OX Security warned that attackers only need to send a malicious link to the victim while Live Server is running in the background to exploit the flaw.

The vulnerability remains unpatched despite the researchers having disclosed the vulnerabilities to these platformsโ€™ maintainers in July and August 2025 through multiple channels.

๐Ÿ“ฐ https://www.infosecurity-magazine.com/news/vulnerabilities-vs-code-cursor/

VulnWatch Monday: CVE-2026-2441 ๐Ÿ”“

Google has released a security update to patch a newly discovered zero-day in Chrome.

The tech giant also confirmed that it โ€œis aware that an exploit for CVE-2026-2441 exists in the wild.โ€

https://www.infosecurity-magazine.com/news/google-patches-new-in-wild-chrome/

๐‡๐š๐œ๐ค๐ข๐ง๐  ๐‚๐š๐ฆ๐ฉ๐š๐ข๐ ๐ง ๐„๐ฑ๐ฉ๐ฅ๐จ๐ข๐ญ๐ฌ ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐–๐ข๐ง๐๐จ๐ฐ๐ฌ ๐–๐ข๐ง๐‘๐€๐‘ ๐•๐ฎ๐ฅ๐ง๐ž๐ซ๐š๐›๐ข๐ฅ๐ข๐ญ๐ฒ

A hacking campaign took just days to exploit a newly disclosed security vulnerability in Microsoft Windows version of WinRAR, researchers at Check Point Software have said.

๐Ÿž The attackers leveraged CVE-2025-8088, a path traversal vulnerability in the widely used file archive and compression software WinRAR, which was first disclosed by ESET in August 2025.

โฑ๏ธ Check Pointโ€™s analysis of the campaign suggested that attackers were actively exploiting the vulnerability within days of its disclosure.

๐Ÿ”Ž CVE-2025-8088 enables the creation of arbitrary code by crafting malicious archive files. This lets attackers execute code and maintain persistence on targeted machines, allowing them to secretly monitor users and collect sensitive data.

๐ŸŒ Check Point researchers noted that the attacks had a focus on government institutions and law enforcement agencies in Southeast Asia, pointing to a cyber-espionage campaign with the goal of collecting intelligence for geopolitical goals.

๐Ÿ‡จ๐Ÿ‡ณ Researchers concluded that the campaign was being conducted by a group dubbed Amarath-Dragon. The tools, techniques and procedures by Amarath-Dragon closely resemble APT 41, the prolific Chinese state-linked cyber-espionage and hacking group.

๐Ÿ—จ๏ธ โ€œThe campaigns by Amaranth-Dragon exploiting the CVE-2025-8088 vulnerability highlight the recent trend of sophisticated threat actors rapidly weaponizing newly disclosed vulnerabilities,โ€ Check Point Research said in a blog post.

๐Ÿ“ฐ https://www.infosecurity-magazine.com/news/hacking-exploits-windows-winrar/