Skip to content
Threat Feed

January 2024 (30)

medium advisory

i18next-http-middleware HTTP Response Splitting and DoS Vulnerability

i18next-http-middleware versions before 3.9.3 are vulnerable to HTTP response splitting and denial-of-service attacks due to unsanitized Content-Language headers, potentially leading to session fixation, cache poisoning, reflected XSS, or complete service disruption depending on the Node.js version.

i18next-http-middleware crlf-injection http-response-splitting denial-of-service i18next
2r 1t
medium advisory

Incoming Execution via WinRM Remote Shell

This rule detects incoming execution via Windows Remote Management (WinRM) remote shell on a target host, which could be an indication of lateral movement by monitoring network traffic on ports 5985 or 5986 and processes initiated by WinRM.

Elastic Defend +1 lateral-movement windows winrm remote-execution
2r 1t
low advisory

Ingress Transfer via Windows BITS

Adversaries may leverage Windows Background Intelligent Transfer Service (BITS) to download executable and archive files to evade defenses and establish command and control.

Background Intelligent Transfer Service +2 bits ingress-transfer command-and-control defense-evasion windows
2r 2t
high advisory

Invoke-Obfuscation Obfuscated IEX Invocation via PowerShell

Attackers use Invoke-Obfuscation, a PowerShell obfuscation framework, to generate obfuscated IEX (Invoke-Expression) commands, evading detection and executing malicious code.

Windows defense-evasion execution powershell obfuscation
2r 2t
medium advisory

IOBit Unlocker Extension DLL Registration via Regsvr32

The IOBit Unlocker Extension DLL is being registered via regsvr32.exe, a Windows utility used to unlock files or folders by terminating locking processes, which could be abused for malicious purposes.

Unlocker Extension +3 iobit unlocker regsvr32 dll windows threat-detection
2r 1t
high advisory

JoeCastrom mcp-chat-studio Server-Side Request Forgery Vulnerability

A server-side request forgery vulnerability exists in JoeCastrom mcp-chat-studio up to version 1.5.0 in the LLM Models API component, allowing remote attackers to manipulate the req.query.base_url argument and potentially conduct further attacks.

mcp-chat-studio cve-2026-7147 ssrf
2r 1t 1c
high advisory

Jupyter Server CORS Origin Validation Bypass via Regex

Jupyter Server versions 2.17.0 and earlier are vulnerable to a CORS origin validation bypass due to improper use of `re.match()` in validating the Origin header against the `allow_origin_pat` configuration, allowing attackers to bypass CORS restrictions.

jupyter-server cors origin-validation regex web-application
2r 1t
high advisory

Kata Containers CopyFile Policy Subversion via Symlinks

An oversight in the CopyFile policy in Kata Containers allows untrusted hosts to write to arbitrary locations inside the guest workload image via symlinks, enabling binary overwrites and data exfiltration.

kata-containers/kata-containers kata-containers container-escape symlink
3r 2t 1c
medium advisory

Katalyst Koi Session Cookies Replayable After Logout

Katalyst Koi versions before 4.20.0 and between 5.0.0 and 5.6.0 fail to invalidate admin session cookies upon logout, allowing attackers with a valid cookie to maintain unauthorized access.

katalyst-koi +2 session-replay vulnerability authentication
2r 1t
medium advisory

Keras Model Loader Vulnerable to Denial-of-Service via Malicious HDF5 Shape Bombs

Keras model loader is vulnerable to denial-of-service by loading specially crafted .keras files containing HDF5-based weight files with maliciously oversized dataset metadata, leading to immediate memory exhaustion during model loading.

Keras +2 denial-of-service hdf5 model-loading shape-bomb
2r 1t 1c 1i
high advisory

Kirby CMS Missing Authorization Vulnerability

Kirby CMS versions before 4.9.0 and between 5.0.0 and 5.3.3 contain a missing authorization vulnerability, allowing authenticated Panel users to access site model, user, and role information without proper permission checks, potentially leading to unauthorized information disclosure.

cms +1 authorization privilege-escalation web-application
3r 1t
high advisory

Kubernetes and Cloud Credential Path Access via Process Arguments

This rule detects Linux process executions that access sensitive Kubernetes, cloud, and SSH credential files via common utilities, potentially indicating credential theft.

Elastic Defend +4 credential-access kubernetes cloud linux
2r 2t
high advisory

Kubernetes Pod Exec Cloud Instance Metadata Access

Detection of Kubernetes pod exec sessions accessing cloud instance metadata endpoints, indicating potential credential theft from AWS, GCP, or Azure.

AWS IMDS +2 kubernetes cloud credential_access execution
2r 2t
high advisory

Kubernetes Pod Exec Potential Reverse Shell Activity Detected

This rule flags potential reverse shell activity via kubectl exec commands in Kubernetes pods by detecting specific shell and socket idioms within URL-decoded command payloads in Kubernetes audit logs, indicating post-exploitation interactive access and command-and-control.

Kubernetes reverse_shell execution command_and_control
3r 2t
high advisory

Kubernetes Rapid Secret GET Activity Against Multiple Objects

Detects an unusual volume of Kubernetes API get requests against multiple distinct Secret objects from the same client fingerprint, potentially indicating credential access or in-cluster reconnaissance.

Kubernetes credential-access threat-detection
2r 1t
high advisory

Kubernetes Secret Access with Suspicious User Agent

Detects read access to Kubernetes Secrets (`get`/`list`) with a user agent matching a curated set of non-standard or attacker-leaning clients, indicating potential credential access.

kubernetes credential-access cloud
2r 1t
medium advisory

LatePoint WordPress Plugin Stored XSS Vulnerability

The LatePoint WordPress plugin is vulnerable to stored XSS via the booking_form_page_url parameter, allowing unauthenticated attackers to inject arbitrary web scripts in pages that execute when a user accesses the injected page.

LatePoint – Calendar Booking Plugin for Appointments and Events plugin <= 5.5.0 wordpress xss stored-xss cve-2026-7332 plugin
2r 1c
medium advisory

Linux Auditd Daemon Abort Detection

Detection of abnormal Linux audit daemon (auditd) termination via DAEMON_ABORT events, indicating potential auditing subsystem failure due to resource exhaustion, corruption, or malicious interference.

Splunk Enterprise +3 auditd linux anomaly endpoint
2r 1t
high advisory

Linux Defense Impairment via Process Termination

Detection of 'pkill' command execution on Linux systems, a technique used by threat actors to disable security defenses or terminate critical processes, potentially leading to data corruption or destruction.

Splunk Enterprise +2 defense-evasion process-termination linux
2r
high threat

Linux Iptables Firewall Modification Detection

This brief details a Splunk search that identifies suspicious command-line activity modifying iptables firewall settings on Linux systems, potentially indicating Cyclops Blink malware activity allowing C2 communication by opening specific TCP ports.

ASUS routers Sandworm Tools iptables firewall linux cyclopsblink
2r 1t
high advisory

Linux Kernel proc_readdir_de() Use-After-Free Local Privilege Escalation

A local privilege escalation vulnerability exists in the Linux Kernel versions ~3.14+ through 6.18-rc5 due to a use-after-free in the proc_readdir_de() function, where a concurrent traversal can dereference a freed entry's fields during network device unregistration, leading to privilege escalation via modprobe_path overwrite.

Linux Kernel local-privilege-escalation kernel-vulnerability use-after-free linux
2r 1t 1c
medium advisory

liquidjs Denial of Service via Circular Block Reference

A vulnerability in liquidjs versions prior to 10.25.7 allows for denial of service due to a circular block reference in the layout, causing an infinite recursive loop that exhausts memory and crashes the Node.js process.

liquidjs denial-of-service template-injection
2r 1t
high advisory

LiteLLM Authenticated Command Execution via MCP stdio Test Endpoints

Authenticated users with low-privilege API keys could execute arbitrary commands on the host running LiteLLM via the `/mcp-rest/test/connection` and `/mcp-rest/test/tools/list` endpoints, by submitting a server configuration including command execution parameters.

litellm rce command-injection
2r 1t
low advisory

LOLBIN Network Connection for Defense Evasion

Adversaries can use Living-Off-The-Land Binaries (LOLBINs) such as expand.exe, extrac32.exe, ieexec.exe, and makecab.exe to establish network connections, potentially bypassing security controls and facilitating malicious activities on Windows systems.

Elastic Defend +2 lolbin defense-evasion windows
2r 1t
medium advisory

LSA PPL Protection Setting Modification via CommandLine

Attackers modify LSA PPL protection settings via command-line tools like reg.exe and PowerShell to weaken system security and enable credential dumping.

defense-evasion credential-access windows
2r 1t
medium advisory

macOS Kernel-to-Userland Process Creation Notification via undocumented kev_msg_post

The kev_msg_post function can be abused by malware to broadcast process creation notifications from a kernel extension (kext) to a user-mode application, potentially bypassing security tools that rely on standard APIs and leading to undetected malicious activity.

BlockBlock kernel-extension kev_msg_post macos process-monitoring
2r
high advisory

macOS Local Privilege Escalation via Dylib Hijacking in App Store Applications

A local privilege escalation vulnerability in macOS allows attackers to gain root privileges by hijacking dylibs in applications installed from the Mac App Store.

Tresorit +3 dylib-hijacking privilege-escalation macos
3r 2t
high advisory

macOS Mojave System Lockup via vmmap Utility Targeting PID 1

A bug in macOS Mojave causes a system lockup when the vmmap utility is executed against process ID 1 (launchd), due to a deadlock triggered by XPC calls during symbolication.

macOS Mojave macos lockup vmmap pid1
2r
medium advisory

macOS QuickLook Thumbnail Cache Leak

macOS QuickLook caches thumbnails and file paths of files, even those stored within encrypted containers or on removable USB devices, potentially revealing sensitive data to attackers with access to the running system.

macOS quicklook cache thumbnail privacy
2r 1t
high threat

Malicious Use of Microsoft Intune Device Management Configuration Policies

Attackers can abuse Microsoft Intune device management configuration policies, typically used for legitimate remote device management, to disable defenses and evade detection on managed devices.

exploited Intune azure device_management policy defense_evasion
2r 3t