Programmer’s Digest #117
01/08/2025-01/15/2025 Critical SimpleHelp Flaws, Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllers, Critical RCE Flaw in GFI KerioControl And More.
1. Critical SimpleHelp Flaws Allow File Theft, Privilege Escalation, and RCE Attacks
Researchers have identified critical vulnerabilities in SimpleHelp remote access software, potentially enabling information disclosure, privilege escalation, and remote code execution. Horizon3.ai’s Naveen Sunkavally described the flaws as easy to exploit:
- CVE-2024-57727: An unauthenticated path traversal flaw lets attackers download arbitrary files, including hashed admin and technician passwords.
- CVE-2024-57728: Allows admins or privileged technicians to upload files anywhere, potentially enabling remote code execution.
- CVE-2024-57726: A privilege escalation vulnerability lets low-privilege technicians gain admin access by exploiting missing authorization checks.
Attackers could chain CVE-2024-57726 and CVE-2024-57728 to gain admin control and execute malicious payloads. Following disclosure on January 6, 2025, SimpleHelp released patches in versions 5.3.9, 5.4.10, and 5.5.8. Users are urged to patch immediately, update admin and technician passwords, and restrict login IPs to protect against potential exploitation.
2. CISA Adds Second BeyondTrust CVE to Known Exploited Vulnerabilities List
CISA added a command injection vulnerability in BeyondTrust Remote Support and Privileged Access products (CVE-2024-12686) to its catalog of known exploited vulnerabilities. This medium-severity flaw (CVSS 6.6) allows attackers with admin privileges to inject commands into networks as site users. It follows CVE-2024-12356, a critical command injection flaw (CVSS 9.8) linked to BeyondTrust’s investigation into a December attack spree. During the attacks, a compromised SaaS API key led to password resets for multiple accounts, affecting some RemoteSupport SaaS customers. It’s unclear if CVE-2024-12686 is exploited alone or chained with CVE-2024-12356. Federal agencies are investigating connections between these CVEs and the Treasury Department hack, attributed to a Chinese state-linked actor using a stolen vendor key.
3. Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllers
Palo Alto Networks has patched several vulnerabilities in its Expedition migration tool, including a high-severity flaw (CVE-2025-0103, CVSS 7.8) that allows authenticated attackers to access sensitive data like passwords, device configurations, and API keys. Expedition, which reached end-of-life on December 31, 2024, also had other flaws:
- CVE-2025-0104 (CVSS 4.7): XSS allowing phishing and session theft.
- CVE-2025-0105 (CVSS 2.7): File deletion by unauthenticated attackers.
- CVE-2025-0106 (CVSS 2.7): File enumeration via wildcard expansion.
- CVE-2025-0107 (CVSS 2.3): OS command injection enabling data disclosure.
Fixes are available in versions 1.2.100 and 1.2.101. Palo Alto advises restricting access or disabling the tool if unused.
Meanwhile, SonicWall patched SonicOS vulnerabilities, including CVE-2024-53704 (authentication bypass) and CVE-2024-53706 (privilege escalation). Polish firm Securing also disclosed a critical Aviatrix Controller flaw (CVE-2024-50603, CVSS 10.0) fixed in versions 7.1.4191 and 7.2.4996. Users are urged to apply these updates promptly.
4. Critical RCE Flaw in GFI KerioControl Allows Remote Code Execution via CRLF Injection
Threat actors are exploiting a recently disclosed security flaw in GFI KerioControl firewalls, CVE-2024-52875, enabling remote code execution (RCE). The vulnerability stems from a CRLF injection attack that allows HTTP response splitting, potentially leading to cross-site scripting (XSS). KerioControl versions 9.2.5–9.4.5 are affected, as disclosed by security researcher Egidio Romano. Exploitation involves injecting malicious inputs into HTTP headers, exploiting unsanitized user input in specific URI paths like /nonauth/addCertException.cs and /nonauth/guestConfirm.cs. GFI released a fix (version 9.4.5 Patch 1) on December 19, 2024. However, a proof-of-concept exploit surfaced, enabling adversaries to craft malicious URLs that trigger firmware upgrades via admin clicks, potentially granting root access. GreyNoise reported exploitation attempts from seven IPs since December 28, 2024. Over 23,800 internet-exposed KerioControl instances are at risk, mainly in Iran, Italy, and the U.S. Users should secure their instances immediately to mitigate threats.
5. Critical Ivanti Connect Secure zero-day flaw under attack
Ivanti disclosed a critical vulnerability, CVE-2025-0282, affecting Connect Secure, Policy Secure, and ZTA gateways. This stack-based buffer overflow flaw, with a 9.0 CVSS score, enables remote code execution in Connect Secure versions before 22.7R2.5, Policy Secure before 22.7R1.2, and ZTA gateways before 22.7R2.3. Another vulnerability, CVE-2025-0283, allows privilege escalation for local attackers and has a 7.0 CVSS score. While CVE-2025-0282 exploitation is confirmed for Connect Secure, Ivanti reports no exploitation of Policy Secure, ZTA gateways, or CVE-2025-0283. Ivanti released patches for affected Connect Secure versions, with Policy Secure and ZTA patches expected by January 21. Exploitation of CVE-2025-0282 can be detected using Ivanti’s Integrity Checker Tool (ICT).
Ivanti credited Mandiant and Microsoft for their assistance and emphasized proactive monitoring with ICT to safeguard network infrastructure.