<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Unauthorized-Access — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/unauthorized-access/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 17 Apr 2026 20:16:35 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/unauthorized-access/feed.xml" rel="self" type="application/rss+xml"/><item><title>Anviz CX2 Lite Authenticated Command Injection Vulnerability (CVE-2026-35682)</title><link>https://feed.craftedsignal.io/briefs/2026-04-anviz-command-injection/</link><pubDate>Fri, 17 Apr 2026 20:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-anviz-command-injection/</guid><description>Anviz CX2 Lite is vulnerable to an authenticated command injection via the filename parameter, leading to arbitrary command execution and root-level access.</description><content:encoded><![CDATA[<p>CVE-2026-35682 describes an authenticated command injection vulnerability in Anviz CX2 Lite devices. An attacker with valid user credentials can inject arbitrary commands into the filename parameter, leading to remote code execution with root privileges. The vulnerability allows an attacker to execute commands like starting telnetd, effectively gaining complete control over the device. This poses a significant risk to organizations using vulnerable Anviz CX2 Lite devices for access control or time attendance, potentially leading to unauthorized access, data breaches, or denial-of-service conditions. The ICS-CERT advisory, ICSA-26-106-03, provides additional details.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains valid credentials for an Anviz CX2 Lite device.</li>
<li>The attacker authenticates to the device&rsquo;s web interface or API.</li>
<li>The attacker identifies the vulnerable filename parameter in a specific request.</li>
<li>The attacker crafts a malicious request containing a command injection payload within the filename parameter (e.g., <code>filename=;telnetd -p 1337 -l /bin/sh;</code>).</li>
<li>The Anviz CX2 Lite device processes the request, improperly sanitizing the filename parameter.</li>
<li>The injected command executes with root privileges on the device.</li>
<li>The attacker uses the executed command to start a service like telnetd.</li>
<li>The attacker connects to the newly started service, gaining a root shell and complete control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35682 allows a remote attacker to gain root-level access to the Anviz CX2 Lite device. This can lead to complete system compromise, including unauthorized access to sensitive data, modification of device settings, and potential use of the device as a foothold for further attacks within the network. Given that these devices are often used for physical access control, this vulnerability could lead to unauthorized physical access to secured areas.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates from Anviz to remediate CVE-2026-35682. Contact Anviz directly through their website for support and remediation steps (<a href="https://www.anviz.com/contact-us.html)">https://www.anviz.com/contact-us.html)</a>.</li>
<li>Deploy the Sigma rule <code>Detect Anviz CX2 Lite Command Injection Attempt</code> to identify exploitation attempts against the device.</li>
<li>Monitor web server logs for suspicious requests containing command injection payloads in the filename parameter to identify potential exploitation attempts.</li>
<li>Review authentication logs for unauthorized access attempts to the Anviz CX2 Lite devices.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>unauthorized-access</category><category>iot</category></item><item><title>LearnPress WordPress Plugin Unauthorized Data Deletion Vulnerability (CVE-2026-4365)</title><link>https://feed.craftedsignal.io/briefs/2026-04-learnpress-data-deletion/</link><pubDate>Tue, 14 Apr 2026 02:16:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-learnpress-data-deletion/</guid><description>The LearnPress plugin for WordPress is vulnerable to unauthorized data deletion due to a missing capability check on the `delete_question_answer()` function, allowing unauthenticated attackers to delete quiz answer options.</description><content:encoded><![CDATA[<p>The LearnPress plugin for WordPress, in versions up to and including 4.3.2.8, is susceptible to unauthorized data deletion. The vulnerability stems from a missing capability check on the <code>delete_question_answer()</code> function. The plugin exposes a <code>wp_rest</code> nonce in public frontend HTML, and this nonce serves as the sole security check for the <code>lp-load-ajax</code> AJAX dispatcher. As the <code>delete_question_answer</code> action lacks capability or ownership validation, unauthenticated attackers can exploit this flaw to delete arbitrary quiz answer options. This is achieved by sending a crafted POST request containing a publicly available nonce. Exploitation does not require any prior authentication.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a LearnPress installation with a vulnerable version (&lt;= 4.3.2.8).</li>
<li>The attacker accesses the public frontend of the WordPress site.</li>
<li>The attacker retrieves the <code>wp_rest</code> nonce from the <code>lpData</code> variable in the HTML source code. This nonce is used for AJAX requests.</li>
<li>The attacker crafts a POST request to the <code>wp-admin/admin-ajax.php</code> endpoint.</li>
<li>The crafted POST request includes the <code>action</code> parameter set to <code>delete_question_answer</code>.</li>
<li>The request also includes the <code>nonce</code> parameter with the value of the retrieved <code>wp_rest</code> nonce.</li>
<li>The request includes the <code>answer_id</code> parameter set to the ID of the quiz answer option to be deleted.</li>
<li>The server, lacking proper capability checks, processes the request and deletes the specified quiz answer option from the database. This results in data loss and potentially disrupts the functionality of quizzes within the LearnPress plugin.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows unauthenticated attackers to arbitrarily delete quiz answer options within the LearnPress plugin. This can lead to data loss, disruption of quizzes, and potentially compromise the integrity of educational content. The CVSS v3.1 base score for this vulnerability is 9.1, indicating a critical severity. The number of victims and specific sectors targeted are currently unknown, but any website using the vulnerable LearnPress plugin is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the LearnPress plugin to a version greater than 4.3.2.8 to patch CVE-2026-4365.</li>
<li>Deploy the Sigma rule &ldquo;Detect LearnPress Unauthorized Data Deletion Attempt&rdquo; to your SIEM to identify potential exploitation attempts.</li>
<li>Monitor web server logs for POST requests to <code>wp-admin/admin-ajax.php</code> with the <code>action</code> parameter set to <code>delete_question_answer</code> and investigate suspicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>learnpress</category><category>data-deletion</category><category>unauthorized-access</category></item><item><title>Red Hat OpenShift AI Llama Stack Unauthorized Access Vulnerability (CVE-2025-12805)</title><link>https://feed.craftedsignal.io/briefs/2026-03-openshift-ai-vuln/</link><pubDate>Fri, 27 Mar 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openshift-ai-vuln/</guid><description>CVE-2025-12805 describes a flaw in Red Hat OpenShift AI (RHOAI) llama-stack-operator that allows unauthorized access to Llama Stack services in other namespaces via direct network requests due to missing NetworkPolicy restrictions, potentially enabling attackers to view or manipulate sensitive data.</description><content:encoded>&lt;p>A vulnerability, CVE-2025-12805, has been identified in Red Hat OpenShift AI (RHOAI) llama-stack-operator. The vulnerability stems from the lack of NetworkPolicy restrictions on the llama-stack service endpoint. This allows a user within one namespace to bypass intended isolation and directly access Llama Stack services deployed in other namespaces. The vulnerability was published on March 26, 2026. Successful exploitation could lead to unauthorized data access and manipulation, impacting the…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openshift</category><category>kubernetes</category><category>networkpolicy</category><category>unauthorized-access</category></item><item><title>Azure AD Authentication from Unexpected Geo-locations</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-auth-bypass/</link><pubDate>Mon, 29 Jan 2024 18:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-auth-bypass/</guid><description>Detection of successful authentications originating from geographic locations outside of an organization's expected operational footprint, potentially indicating compromised credentials or unauthorized access.</description><content:encoded><![CDATA[<p>This brief addresses the risk of unauthorized access to Azure Active Directory (Azure AD) resources stemming from successful authentication events originating from unexpected geographic locations. While the source material does not attribute this activity to a specific threat actor, such access can be indicative of compromised user accounts, sophisticated phishing attacks, or insider threats. The focus is on detecting deviations from established operational norms, where user logins typically originate from known and trusted countries. By monitoring sign-in logs, security teams can identify potentially malicious activity that bypasses standard security controls and warrants further investigation. Effective detection relies on maintaining an accurate list of countries where the organization operates.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Credential Compromise:</strong> An attacker obtains valid user credentials through phishing, malware, or credential stuffing.</li>
<li><strong>Initial Access:</strong> The attacker leverages the compromised credentials to attempt authentication to Azure AD.</li>
<li><strong>Authentication Request:</strong> The attacker initiates a sign-in request to Azure AD from an IP address associated with an unexpected geographic location.</li>
<li><strong>Bypass MFA (if present):</strong> If multi-factor authentication (MFA) is enabled, the attacker may attempt to bypass it through techniques like MFA fatigue or SIM swapping.</li>
<li><strong>Successful Authentication:</strong> The attacker successfully authenticates to Azure AD, gaining access to cloud resources and applications.</li>
<li><strong>Privilege Escalation:</strong> The attacker attempts to escalate privileges within the Azure AD environment to gain broader access.</li>
<li><strong>Lateral Movement:</strong> The attacker moves laterally within the cloud environment, accessing sensitive data and resources.</li>
<li><strong>Data Exfiltration / Persistence:</strong> The attacker exfiltrates sensitive data or establishes persistent access for future malicious activity.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to significant data breaches, financial loss, and reputational damage. The extent of the impact depends on the level of access gained by the attacker and the sensitivity of the compromised data. Organizations may face regulatory fines, legal action, and loss of customer trust. The absence of geographic restrictions on authentication increases the attack surface and elevates the risk of unauthorized access from malicious actors operating outside of the organization&rsquo;s control.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule provided to detect successful authentications from countries outside of the organization&rsquo;s operational footprint, based on the <code>Location</code> field in Azure AD sign-in logs.</li>
<li>Maintain and regularly update a whitelist of countries where the organization operates to ensure the accuracy of the <code>filter</code> in the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the sign-in event and the potential compromise of the user account.</li>
<li>Enforce multi-factor authentication (MFA) for all users to mitigate the risk of credential compromise, although attackers may attempt to bypass MFA.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azuread</category><category>authentication</category><category>geo-location</category><category>unauthorized-access</category><category>credential-compromise</category><category>privilege-escalation</category></item></channel></rss>