<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>ACL Analytics (11.x Through 13.0.0.579) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/acl-analytics-11.x-through-13.0.0.579/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 17 May 2026 13:17:18 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/acl-analytics-11.x-through-13.0.0.579/feed.xml" rel="self" type="application/rss+xml"/><item><title>ACL Analytics Arbitrary Code Execution Vulnerability (CVE-2018-25320)</title><link>https://feed.craftedsignal.io/briefs/2026-05-acl-analytics-rce/</link><pubDate>Sun, 17 May 2026 13:17:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-acl-analytics-rce/</guid><description>ACL Analytics versions 11.x through 13.0.0.579 contain an arbitrary code execution vulnerability (CVE-2018-25320) that allows attackers to execute arbitrary commands by leveraging the EXECUTE function, potentially leading to remote code execution with system privileges.</description><content:encoded><![CDATA[<p>ACL Analytics versions 11.x through 13.0.0.579 are susceptible to an arbitrary code execution vulnerability. This vulnerability, identified as CVE-2018-25320, stems from the EXECUTE function within the software. An attacker can exploit this flaw to inject and execute arbitrary commands on the targeted system. The attack involves leveraging the EXECUTE function to download and execute malicious PowerShell scripts using bitsadmin. Successful exploitation grants the attacker SYSTEM-level privileges, enabling them to establish reverse shells and gain complete control over the compromised system. This vulnerability poses a significant threat to organizations using affected versions of ACL Analytics, potentially resulting in data breaches, system compromise, and further malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable ACL Analytics instance running versions 11.x through 13.0.0.579.</li>
<li>The attacker crafts a malicious command that leverages the EXECUTE function within ACL Analytics.</li>
<li>The crafted command uses bitsadmin to download a malicious PowerShell script from a remote server.</li>
<li>ACL Analytics executes the bitsadmin command, downloading the PowerShell script to the compromised system.</li>
<li>The downloaded PowerShell script is then executed with SYSTEM privileges.</li>
<li>The PowerShell script establishes a reverse shell connection to the attacker&rsquo;s controlled server.</li>
<li>The attacker gains complete control over the compromised system with SYSTEM privileges.</li>
<li>The attacker can perform various malicious activities, including data exfiltration, installing malware, or pivoting to other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2018-25320 can lead to complete system compromise. An attacker with SYSTEM privileges can access sensitive data, install malware, and pivot to other systems within the organization&rsquo;s network. This can result in significant financial losses, reputational damage, and legal liabilities. The vulnerability affects all organizations using ACL Analytics versions 11.x through 13.0.0.579, potentially impacting a wide range of sectors that rely on this software for data analysis and compliance.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade ACL Analytics to a patched version beyond 13.0.0.579 to remediate CVE-2018-25320.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious Bitsadmin Usage for Download&rdquo; to identify potential exploitation attempts using bitsadmin as described in the attack chain.</li>
<li>Monitor process creation events for PowerShell scripts being executed with SYSTEM privileges after a bitsadmin download, as this is a common indicator of compromise, activating the &ldquo;Detect PowerShell Reverse Shell&rdquo; Sigma rule.</li>
<li>Implement network monitoring to detect reverse shell connections originating from systems running ACL Analytics.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>code execution</category><category>vulnerability</category><category>acl analytics</category></item></channel></rss>