94 Followers
9 Following
72 Posts

We protect companies against hackers and criminals. #moresecurity is our mission.

Imprint: http://usd.de/en/imprint
Privacy protection: http://usd.de/en/privacy-protection

Websitehttps://www.usd.de/en/
Security Advisorieshttps://herolab.usd.de/en/security-advisories/
Events (German)https://www.usd.de/cst-academy/events/

Our pentest professionals at #usdHeroLab identified several vulnerabilities in #KofaxCommunicationServer (KCS) and in the #ArcGIS scripting language Arcade ranging from path traversal to XSS.

All #vulnerabilities were responsibly reported to the vendors.

πŸ‘‰ Details on our #SecurityAdvisories can be found here: https://www.usd.de/en/security-advisories-kofax-communication-server-arcgis-arcade/

#Kofax #InfoSec #CyberSecurity #Pentesting #AppSec #Hacking

Security Advisories: Kofax Communication Server & ArcGIS | usd AG

Our penetration testing professionals have identified critical vulnerabilities in Kofax Communication Server and ArcGIS Arcade. Learn more here.

more security. usd AG

Our security analyst @kpwn identified two #XSS vulnerabilities during web application pentests.

πŸ‘‰ Affected software: Weblication CMS Core and d.3one. These vulnerabilities enable attackers to execute requests on behalf of other users.

πŸ“° Detailed information on our advisories can be found here: https://www.usd.de/en/security-advisories-d-3one-and-weblication-cms-core/

#Pentesting #InfoSec #AppSec #CyberSecurity #Vulnerability #Hacking

Security Advisories: d.3one & Weblication CMS Core | usd AG

During their penetration tests, our security analysts identified XSS vulnerabilities in Weblication CMS Core and d.3one. Learn more here.

more security. usd AG

Unauthenticated RCE in Agorum Core Open!

During their regular security analyses, our pentest professionals from #usdHeroLab examined the open source software #AgorumCoreOpen.

They discovered multiple #vulnerabilities that, when chained together, allow an unauthenticated attacker to achieve full remote code execution with root privileges. This critical flaw enables complete system compromise without prior authentication.

πŸ“°πŸ‘‰ Detailed information on the published #SecurityAdvisories can be found here: https://www.usd.de/en/security-advisories-on-agorum-core-open/

#Pentest #Pentesting #moresecurity #RCE #CyberSecurity #InfoSec

Security Advisories on Agorum Core Open | usd AG

Our colleagues discovered critical vulnerabilities in Agorum Core Open that could be exploited to compromise the entire system.

more security. usd AG
πŸ” Our professionals at the usd HeroLab have closely examined the software #Vtiger. They discovered two vulnerabiltiies that allow low-privileged authorized users to upload files and thereby execute arbitrary code.

πŸ‘‰ You can find more information in the full security advisories: https://www.usd.de/en/security-advisories-vtiger/

#SecurityAdvisories #Pentest #Pentesting #moresecurity
Security Advisories on Vtiger | usd AG

Read more about two identified vulnerabilities in the software Vtiger that allow low-privileged authorized users to upload files and execute arbitrary code.

more security. usd AG
@stoeps Cool, dass du dabei warst :) Mit der Web Security Academy hast du eine hervorragende Ressource, um dich in Webapp-Pentests fortzubilden. Selbst unsere "alten Hasen" lernen noch daran.

CVE-2025-27599 is a really clever and creative attack targeting #ElementX Android.

A malicious app can exploit this vulnerability to launch ElementX in a WebView with any URL, enabling attackers to:
- Launch phishing attacks
- Record and exfiltrate the victim's video and audio (due to Element Call permissions)

Full advisory: https://herolab.usd.de/security-advisories/usd-2025-0010/

Big shout-out to my awesome colleagues for discovering this and to Element for their quick response.

#Matrix #Element #CVE

usd-2025-0010 - Element X Android - usd HeroLab

Advisory ID: usd-2025-0010 | Product: Element X Android | Vulnerability Type: Improper Export of Android Application Components (CWE-926)

usd HeroLab

We have found an interesting vulnerability in a #Matrix #Android client:

🧩 Software: #Element X Android
πŸ“¦ Affected Version: <= 25.04.1
πŸ†” CVE: CVE-2025-27599
πŸ“Š CVSSv3.1: MEDIUM
⚠️ Prerequisites: Clicking on a crafted hyperlink or using a malicious app

Since Element X Android usually has the permission to access camera and microphone, this can be used to record audio and video from the victim. Pretty bad! 😨

πŸ”— Read more: https://herolab.usd.de/security-advisories/usd-2025-0010/

#InfoSec #CyberSecurity #Pentesting #Hacking #CVE_2025_27599 #SpyWare #Phishing

usd-2025-0010 - Element X Android - usd HeroLab

Advisory ID: usd-2025-0010 | Product: Element X Android | Vulnerability Type: Improper Export of Android Application Components (CWE-926)

usd HeroLab

Am 16.05. empfangen mein Kollege Nick Lorenz und ich euch in KΓΆln zu den usd Hackertagen. Bei Pizza und Tschunk reden wir ΓΌbers Hacken und Pentesten.

Praktische Hands-On Erfahrung kΓΆnnt ihr in unserer Trainingsumgebung, dem PentestLab, sammeln.

Wir freuen uns auf alle, die vorbeischauen.

πŸ“… 16.05.2025, 13:00 - 18:30 Uhr + Gemeinsamer Ausklang bei Pizza und Tschunk
πŸ’² kostenlos

Mehr Infos hier: https://www.usd.de/cst-academy/events/usd-hackertage/

#Hacking #Pentesting #CyberSecurity #InfoSec #Education

If you're using Element Android < 1.6.34, you should update.

In according versions, a brute force attack on the PIN code is possible if the PIN code is set and the Internet connection is deactivated (CVE-2025-27606)

πŸ“Œ Read the full details here: https://herolab.usd.de/en/security-advisories/usd-2025-0002/

With the help of this utility we were able to identify all potentially interesting files and download those first to increase efficiency in our analysis. It's now also available on our company GitHub organization: https://github.com/usdAG/webtree.

πŸ”” Follow us for #moresecurity
πŸ” Also, boost the first toot to spread the word!