<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Insecure-Configuration — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/insecure-configuration/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 22 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/insecure-configuration/feed.xml" rel="self" type="application/rss+xml"/><item><title>HKUDS OpenHarness Insecure Default Configuration Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-openharness-default-config/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openharness-default-config/</guid><description>HKUDS OpenHarness prior to PR #147 remediation contains an insecure default configuration vulnerability where remote channels inherit permissive access, potentially leading to unauthorized file disclosure and read access.</description><content:encoded><![CDATA[<p>HKUDS OpenHarness, a tool whose function is not explicitly defined in the source material, prior to the remediation implemented in pull request #147, exhibits an insecure default configuration. This vulnerability arises because remote channels inherit the setting <code>allow_from = [&quot;*&quot;]</code>. This overly permissive configuration allows any remote sender to bypass admission checks, effectively negating intended access controls. The vulnerability was reported on April 21, 2026. Exploitation requires an attacker to reach the configured channel, opening a pathway to host-backed agent runtimes. Successful exploitation can lead to unauthorized file disclosure and read access via default-enabled read-only tools within the OpenHarness environment. Defenders should ensure they are running a version of OpenHarness patched with PR #147 or later.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains network access to the OpenHarness instance.</li>
<li>Attacker identifies a configured remote channel.</li>
<li>Attacker leverages the inherited <code>allow_from = [&quot;*&quot;]</code> configuration to bypass admission controls.</li>
<li>Attacker interacts with a host-backed agent runtime.</li>
<li>Attacker exploits default-enabled read-only tools available within the runtime.</li>
<li>Attacker gains unauthorized read access to sensitive files on the system.</li>
<li>Attacker exfiltrates the disclosed files.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to bypass intended access controls and gain unauthorized read access to files accessible to the OpenHarness agent. This could lead to the disclosure of sensitive information, potentially impacting confidentiality. The scope of the impact depends on the data accessible to the agent runtime and the sensitivity of those files. Given the default-enabled nature of the vulnerability, any OpenHarness deployment prior to PR #147 is potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade HKUDS OpenHarness to a version including or following the remediation provided in <a href="https://github.com/HKUDS/OpenHarness/pull/147">PR #147</a>.</li>
<li>Monitor network connections to the OpenHarness instance for unexpected remote channel access, using a network monitoring solution.</li>
<li>Audit the configuration of OpenHarness channels to ensure that <code>allow_from</code> is not set to <code>[&quot;*&quot;]</code>, but rather to a restrictive set of trusted senders.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>vulnerability</category><category>insecure-configuration</category><category>access-control</category></item><item><title>libssh Insecure Configuration Allows Local MITM Attacks (CVE-2025-14821)</title><link>https://feed.craftedsignal.io/briefs/2026-04-libssh-mitm/</link><pubDate>Tue, 07 Apr 2026 17:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-libssh-mitm/</guid><description>CVE-2025-14821 in libssh allows local man-in-the-middle attacks, SSH downgrade attacks, and trusted host manipulation due to insecure default configuration loading from a world-writable directory on Windows.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2025-14821, has been identified in the libssh library. This flaw arises from an insecure default configuration on Windows systems. Specifically, libssh automatically loads configuration files from the <code>C:\etc</code> directory. Critically, this directory can be created and modified by unprivileged local users. This allows a malicious local user to manipulate the SSH configuration, facilitating man-in-the-middle attacks, downgrading connection security, and manipulating trusted host information. Successful exploitation grants attackers the ability to intercept and potentially modify SSH communications, posing a significant risk to data confidentiality, integrity, and availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker creates the directory <code>C:\etc</code> if it does not already exist.</li>
<li>Attacker creates a malicious SSH configuration file (e.g., <code>ssh_config</code>) within the <code>C:\etc</code> directory. This configuration can specify settings to downgrade encryption or redirect connections.</li>
<li>A legitimate user initiates an SSH connection using an application that leverages the vulnerable libssh library.</li>
<li>libssh automatically loads the attacker-controlled configuration file from <code>C:\etc\ssh_config</code>.</li>
<li>The malicious configuration settings are applied, potentially downgrading the encryption algorithm used for the SSH connection.</li>
<li>The attacker intercepts the SSH traffic, performing a man-in-the-middle attack due to the weakened encryption or connection redirection.</li>
<li>The attacker can now eavesdrop on or modify the SSH communication, gaining unauthorized access to sensitive information or injecting malicious commands.</li>
<li>Attacker maintains persistent access or exfiltrates sensitive data obtained through the compromised SSH session.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-14821 allows a local attacker to perform man-in-the-middle attacks on SSH connections. This can lead to the compromise of sensitive data transmitted over SSH, such as credentials, configuration files, or confidential documents. The ability to manipulate trusted host information further exacerbates the risk, potentially allowing attackers to impersonate legitimate servers. The vulnerability affects any Windows system using a vulnerable version of libssh and could impact organizations across all sectors that rely on SSH for secure communication and remote administration.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for the creation or modification of files within the <code>C:\etc</code> directory, particularly configuration files like <code>ssh_config</code>, using file integrity monitoring (FIM) rules on Windows systems.</li>
<li>Implement the Sigma rule provided to detect the creation of the <code>C:\etc</code> directory by non-system processes.</li>
<li>Restrict write access to the <code>C:\etc</code> directory and its contents using appropriate file system permissions on Windows systems.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>libssh</category><category>mitm</category><category>windows</category><category>cve-2025-14821</category><category>insecure-configuration</category></item></channel></rss>