<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Database — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/database/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 18 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/database/feed.xml" rel="self" type="application/rss+xml"/><item><title>Anviz CrossChex Standard TDS7 PreLogin Encryption Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-anviz-crosschex-vuln/</link><pubDate>Sat, 18 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-anviz-crosschex-vuln/</guid><description>Anviz CrossChex Standard is vulnerable to unauthorized database access due to the manipulation of TDS7 PreLogin, which disables encryption, leading to plaintext transmission of database credentials.</description><content:encoded><![CDATA[<p>Anviz CrossChex Standard is susceptible to a critical vulnerability (CVE-2026-32650) where an attacker can manipulate the TDS7 PreLogin process. By exploiting this flaw, an attacker can disable encryption mechanisms, causing sensitive database credentials to be transmitted in plaintext. This exposure enables unauthorized access to the underlying database, potentially leading to data breaches, modification of records, or other malicious activities. The vulnerability was disclosed in April 2026 and poses a significant risk to organizations utilizing the affected Anviz CrossChex Standard software. The vulnerability exists because the application allows for a downgrade to a less secure algorithm during negotiation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an Anviz CrossChex Standard instance exposed to network access.</li>
<li>The attacker initiates a connection to the TDS7 PreLogin port.</li>
<li>The attacker crafts a malicious TDS7 PreLogin packet to negotiate a connection without encryption.</li>
<li>The CrossChex Standard software, due to the vulnerability, accepts the unencrypted connection.</li>
<li>The software transmits database credentials in plaintext over the unencrypted channel.</li>
<li>The attacker intercepts the plaintext database credentials.</li>
<li>The attacker uses the obtained credentials to authenticate directly to the database server.</li>
<li>The attacker gains unauthorized access to the CrossChex Standard database, enabling them to read, modify, or delete sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32650 allows unauthorized access to the Anviz CrossChex Standard database. This can lead to the exposure of sensitive employee data, including personal information and access control details. Depending on the database permissions, an attacker could also modify time and attendance records, manipulate user accounts, or even compromise the entire physical access control system managed by CrossChex Standard. The impact could range from privacy violations to significant security breaches affecting physical premises.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or updates for Anviz CrossChex Standard as provided by the vendor to remediate CVE-2026-32650.</li>
<li>Monitor network traffic for connections to the TDS7 PreLogin port that do not negotiate encryption using the provided network connection Sigma rule.</li>
<li>Restrict network access to the TDS7 PreLogin port only to trusted hosts and networks using firewall rules to mitigate the risk of unauthorized access.</li>
<li>Enable logging on the database server and monitor for successful logins from unusual IP addresses or accounts after applying the network connection Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-32650</category><category>credential-access</category><category>database</category></item><item><title>Firebird Server Denial-of-Service Vulnerability (CVE-2026-28224)</title><link>https://feed.craftedsignal.io/briefs/2026-04-firebird-dos/</link><pubDate>Sat, 18 Apr 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-firebird-dos/</guid><description>An unauthenticated attacker can trigger a denial-of-service condition on vulnerable Firebird servers by sending a specially crafted op_crypt_key_callback packet, leading to a null pointer dereference and server crash.</description><content:encoded><![CDATA[<p>CVE-2026-28224 describes a denial-of-service vulnerability affecting Firebird, an open-source relational database management system. The vulnerability exists in versions prior to 5.0.4, 4.0.7, and 3.0.14. An unauthenticated attacker can exploit this vulnerability by sending a crafted <code>op_crypt_key_callback</code> packet to the server. When the server receives this packet without prior authentication, the <code>port_server_crypt_callback</code> handler is not initialized, resulting in a null pointer dereference. This leads to a server crash, effectively causing a denial-of-service condition. The attacker only needs to know the server&rsquo;s IP address and port to trigger this vulnerability. The vulnerability has been patched in Firebird versions 5.0.4, 4.0.7 and 3.0.14.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Firebird server by scanning for exposed ports (typically 3050).</li>
<li>The attacker establishes a TCP connection with the targeted Firebird server on the identified port.</li>
<li>The attacker crafts a malicious <code>op_crypt_key_callback</code> packet. This packet does not require prior authentication.</li>
<li>The attacker sends the crafted <code>op_crypt_key_callback</code> packet to the Firebird server.</li>
<li>Upon receiving the packet, the server attempts to process the request in the <code>port_server_crypt_callback</code> handler.</li>
<li>Because no prior authentication has occurred, the <code>port_server_crypt_callback</code> handler is not properly initialized, leading to a null pointer dereference.</li>
<li>The null pointer dereference causes the Firebird server process to crash.</li>
<li>The Firebird database server becomes unavailable, resulting in a denial-of-service condition for legitimate users.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-28224 results in a denial-of-service condition, rendering the Firebird database server unavailable. This can disrupt applications and services that rely on the database, leading to data access issues, application downtime, and potential data loss if proper backup and recovery mechanisms are not in place. The number of affected organizations depends on the prevalence of vulnerable Firebird versions and their exposure to the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Firebird servers to versions 5.0.4, 4.0.7, or 3.0.14 or later to patch CVE-2026-28224.</li>
<li>Deploy the Sigma rule &ldquo;Detect Unauthenticated Firebird Crypt Callback&rdquo; to your SIEM to identify potential exploitation attempts targeting this vulnerability.</li>
<li>Implement network segmentation and access control lists (ACLs) to restrict access to Firebird servers from untrusted networks, mitigating the risk of unauthorized exploitation (network_connection logs).</li>
<li>Monitor network traffic for suspicious <code>op_crypt_key_callback</code> packets being sent to Firebird servers, particularly from untrusted sources (network_connection logs).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-28224</category><category>denial-of-service</category><category>firebird</category><category>database</category></item><item><title>Firebird Path Traversal Vulnerability Leads to Code Execution (CVE-2026-40342)</title><link>https://feed.craftedsignal.io/briefs/2026-04-firebird-path-traversal/</link><pubDate>Fri, 17 Apr 2026 20:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-firebird-path-traversal/</guid><description>An authenticated user with CREATE FUNCTION privileges can exploit a path traversal vulnerability in Firebird versions prior to 5.0.4, 4.0.7, and 3.0.14, to load an arbitrary shared library leading to code execution as the server's OS account.</description><content:encoded><![CDATA[<p>Firebird, an open-source relational database management system, is vulnerable to a path traversal flaw (CVE-2026-40342) in versions prior to 5.0.4, 4.0.7, and 3.0.14. This vulnerability resides within the external engine plugin loader. The loader concatenates a user-supplied engine name into a filesystem path without proper sanitization, leaving it open to path traversal attacks. An authenticated user with <code>CREATE FUNCTION</code> privileges can craft a malicious <code>ENGINE</code> name containing path separators and <code>..</code> components. This allows them to load an arbitrary shared library from anywhere on the filesystem. The library&rsquo;s initialization code executes immediately upon loading, before Firebird can validate the module, effectively granting code execution under the security context of the server&rsquo;s operating system account. Upgrading to versions 5.0.4, 4.0.7, or 3.0.14 resolves this issue.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Firebird database server with an account possessing <code>CREATE FUNCTION</code> privileges.</li>
<li>Attacker crafts a malicious <code>ENGINE</code> name that includes path traversal sequences (e.g., <code>../../../../</code>).</li>
<li>The attacker uses the crafted <code>ENGINE</code> name in a <code>CREATE FUNCTION</code> statement, specifying a path to an arbitrary shared library on the filesystem. For example, <code>CREATE FUNCTION evil_func RETURNS INTEGER ENGINE '/path/to/evil/../../../../tmp/evil.so'</code>.</li>
<li>The Firebird server&rsquo;s plugin loader concatenates the provided <code>ENGINE</code> name into a filesystem path without proper validation.</li>
<li>The Firebird server attempts to load the shared library from the attacker-controlled path, effectively bypassing intended access controls.</li>
<li>The operating system loads the shared library into the Firebird server&rsquo;s process.</li>
<li>The shared library&rsquo;s initialization code executes immediately, granting the attacker arbitrary code execution within the context of the Firebird server process.</li>
<li>The attacker gains control of the Firebird server&rsquo;s OS account, potentially leading to data exfiltration, system compromise, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the Firebird server with the privileges of the operating system account running the Firebird service. This can lead to full system compromise, including data exfiltration, modification, or destruction. Given the high CVSS score of 9.9, this vulnerability poses a critical risk to organizations using vulnerable Firebird versions. The impact could range from complete database compromise to lateral movement within the network, depending on the privileges of the Firebird service account.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Firebird servers to versions 5.0.4, 4.0.7, or 3.0.14 to patch CVE-2026-40342.</li>
<li>Monitor Firebird server logs for <code>CREATE FUNCTION</code> statements with suspicious <code>ENGINE</code> names containing path traversal sequences, and deploy the Sigma rule <code>Detect Firebird Create Function Path Traversal</code> to your SIEM.</li>
<li>Implement strict access controls to limit <code>CREATE FUNCTION</code> privileges to only authorized users, and enable audit logging on all Firebird database servers to monitor user activity.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>firebird</category><category>path-traversal</category><category>code-execution</category><category>cve-2026-40342</category><category>database</category></item><item><title>Oracle MySQL Multiple Vulnerabilities</title><link>https://feed.craftedsignal.io/briefs/2026-03-mysql-vulns/</link><pubDate>Tue, 24 Mar 2026 12:40:50 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-mysql-vulns/</guid><description>A remote attacker, either anonymous or authenticated, can exploit multiple vulnerabilities in Oracle MySQL to compromise confidentiality, integrity, and availability.</description><content:encoded><![CDATA[<p>This advisory from the German BSI highlights the risk of multiple vulnerabilities affecting Oracle MySQL. An attacker, either unauthenticated or authenticated, can remotely exploit these weaknesses. Successful exploitation could lead to complete compromise of the MySQL server, including unauthorized access to sensitive data, modification of data, and denial of service. The advisory does not specify particular versions or CVEs, indicating a broad range of potential issues. Defenders should prioritize patching and hardening MySQL instances to mitigate potential risks. Due to the widespread use of MySQL, this poses a significant threat to organizations relying on this database system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Oracle MySQL instance exposed to the network.</li>
<li>The attacker attempts to connect to the MySQL server, potentially anonymously or using stolen credentials.</li>
<li>The attacker exploits a vulnerability in the MySQL server software, such as a buffer overflow or SQL injection flaw.</li>
<li>Successful exploitation allows the attacker to execute arbitrary code on the server.</li>
<li>The attacker gains unauthorized access to sensitive data stored in the database, such as user credentials or financial records.</li>
<li>The attacker modifies data within the database, potentially corrupting critical information or injecting malicious code.</li>
<li>The attacker launches a denial-of-service attack against the MySQL server, rendering it unavailable to legitimate users.</li>
<li>The attacker achieves complete compromise of the MySQL server, potentially using it as a pivot point to access other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these MySQL vulnerabilities can lead to severe consequences. Potential impacts include data breaches, financial loss, data corruption, and service disruption. Organizations relying on MySQL for critical applications and data storage are particularly vulnerable. Without specific numbers of victims available, the widespread usage of MySQL implies broad potential impact across various sectors. Successful attacks may lead to significant reputational damage and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor MySQL server logs for suspicious activity, such as failed login attempts, unusual queries, and unexpected data modifications, to identify potential exploitation attempts.</li>
<li>Deploy the Sigma rule provided below to detect unusual processes spawned by the MySQL server to identify potential exploitation.</li>
<li>Review and enforce strong password policies for all MySQL user accounts to prevent unauthorized access to sensitive data.</li>
<li>Ensure that MySQL instances are not directly exposed to the internet without proper security controls, such as firewalls and intrusion detection systems.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>mysql</category><category>vulnerability</category><category>database</category></item><item><title>ELBA5 5.8.0 Remote Code Execution Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-elba5-rce/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-elba5-rce/</guid><description>ELBA5 version 5.8.0 contains a remote code execution vulnerability (CVE-2018-25272) that allows attackers to obtain database credentials and execute arbitrary commands with SYSTEM level permissions, potentially leading to complete system compromise.</description><content:encoded><![CDATA[<p>ELBA5 version 5.8.0 is vulnerable to a remote code execution (RCE) vulnerability, identified as CVE-2018-25272. This flaw allows unauthenticated attackers to gain unauthorized access to the underlying database and execute arbitrary commands with SYSTEM level privileges on the host. The vulnerability stems from the application&rsquo;s use of default credentials for database connection, weak password storage, and the availability of powerful stored procedures like <code>xp_cmdshell</code>. Successful exploitation could lead to complete system compromise, sensitive data exposure, and the potential for lateral movement within the network. This vulnerability was published in 2018 but can still be relevant to organizations running older, unpatched versions of ELBA5.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable ELBA5 5.8.0 instance.</li>
<li>Attacker connects to the database using default connector credentials.</li>
<li>Attacker decrypts the DBA password stored within the database configuration.</li>
<li>Attacker enables the <code>xp_cmdshell</code> stored procedure, if disabled.</li>
<li>Attacker executes arbitrary commands on the host system via <code>xp_cmdshell</code> with SYSTEM privileges. For example, they might use <code>xp_cmdshell 'whoami'</code> to verify their access level.</li>
<li>Alternatively, the attacker adds a backdoor user to the BEDIENER table to maintain persistent access.</li>
<li>Attacker uses the newly created backdoor account to log into the application with elevated privileges.</li>
<li>Attacker exfiltrates sensitive data or performs other malicious actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2018-25272 grants the attacker SYSTEM level access to the server hosting ELBA5. This allows for the complete compromise of the system, including data exfiltration, installation of malware, and potential lateral movement within the network. The attacker can access and potentially modify sensitive data stored within the ELBA5 database, impacting the confidentiality and integrity of the application&rsquo;s data. The vulnerability allows for the addition of backdoor accounts, ensuring persistence even after the initial vulnerability is patched.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or upgrades to ELBA5 to address CVE-2018-25272.</li>
<li>Disable or restrict access to the <code>xp_cmdshell</code> stored procedure in the database to prevent command execution as described in the attack chain.</li>
<li>Monitor process creation events for suspicious usage of <code>xp_cmdshell</code> using the provided Sigma rule.</li>
<li>Implement strong password policies and avoid the use of default credentials, mitigating the initial access vector described in the attack chain.</li>
<li>Audit the BEDIENER table for unauthorized user accounts using the provided Sigma rule.</li>
<li>Enable database auditing to detect and respond to suspicious database activity, including attempts to decrypt passwords or modify user accounts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>database</category><category>credential-access</category><category>cve-2018-25272</category><category>elba5</category></item></channel></rss>