Securing IoT Devices From Hackers Eye in 2026
Securing IoT Devices
Continue ReadingSecuring IoT Devices
Continue ReadingShai-Hulud malware campaign, npm Packages
Continue ReadingBISO Analytics from Intrucept ‘A Unified platform to map Business risk with Cyber Risk
Continue ReadingSecurity Advisory:
Elastic has released security updates for Kibana and Elasticsearch.
Addressed 5 vulnerabilities, including 3 high-severity Cross-Site Scripting (XSS) issues
This also include one sensitive data exposure flaw, and one credential leakage issue
| OEM | Elastic |
| Severity | High |
| CVSS Score | 8.7 |
| CVEs | CVE-2025-25009, CVE-2025-25017, CVE-2025-25018, CVE-2025-37727, CVE-2025-37728 |
| POC Available | No |
| Actively Exploited | No |
| Exploited in Wild | No |
| Advisory Version | 1.0 |
Overview
The most severe, CVE-2025-25009 (CVSS 8.7), affects Kibana’s case file upload functionality, potentially allowing attackers to execute arbitrary scripts. These vulnerabilities could allow data theft, session hijacking or privilege escalation in affected environments. Users & Administrators strongly advise to update to the patched versions immediately to mitigate risks.
| Vulnerability Name | CVE ID | Product Affected | Severity | Fixed Version |
| Stored XSS Vulnerability via Case File Upload Vulnerability | CVE-2025-25009 | Kibana | High | v8.18.8, v8.19.5, v9.0.8, v9.1.5 |
| Kibana Cross Site Scripting (XSS) Vulnerability | CVE-2025-25017 | Kibana | High | |
| Kibana Stored Cross Site Scripting (XSS) Vulnerability | CVE-2025-25018 | Kibana | High |
Technical Summary
Elastic’s latest security patches fix several vulnerabilities in Kibana and Elasticsearch. These vulnerabilities could let attackers inject malicious code or gain access to sensitive information.
This could result in stolen data, taken-over user sessions, or even gaining higher access levels in the system. Although no active exploits have been reported, users are strongly advised to update immediately for protection to ensure optimal security and stability .
| CVE ID | System Affected | Vulnerability Details | Impact |
| CVE-2025-25009 | Kibana (7.x ≤ 7.17.29, 7.x ≤ 7.17.29, 8.x ≤ 8.18.7, 8.19.x ≤ 8.19.4, 9.0.x ≤ 9.0.7, 9.1.x ≤ 9.1.4) | Stored XSS via malicious file uploads in case management, allowing JavaScript injection | Data Theft, Session Hijacking, Privilege Escalation |
| CVE-2025-25017 | Kibana (7.x ≤ 7.17.29, 7.x ≤ 7.17.29, 8.x ≤ 8.18.7, 8.19.x ≤ 8.19.3, 9.0.x ≤ 9.0.6, 9.1.x ≤ 9.1.3) | XSS in Vega visualization engine due to improper neutralization of inputs, enabling script execution | Malicious Script Execution |
| CVE-2025-25018 | Kibana (7.x ≤ 7.17.29, 7.x ≤ 7.17.29, 8.x ≤ 8.18.7, 8.19.x ≤ 8.19.4, 9.0.x ≤ 9.0.7, 9.1.x ≤ 9.1.4) | Stored XSS in Kibana due to improper validation of specified type of input. | Session Compromise, Unauthorized Access |
Other Vulnerabilities
In addition to the three high-severity flaws, Elastic patched 2 other vulnerabilities in the same Security Announcements release.
| Vulnerability Name | CVE ID | Product Affected | Severity | Fixed Version |
| Sensitive Data Exposure in Audit Logging | CVE-2025- 37727 | Elasticsearch | Medium | v8.18.8, v8.19.5, v9.0.8, v9.1.5 |
| Credential Leakage in CrowdStrike Connector | CVE-2025- 37728 | Kibana (CrowdStrike Connector) | Medium | v8.18.8 and higher |
Recommendations:
Update Kibana and Elasticsearch immediately to the following versions
If unable to update immediately you can follow some workarounds below
Conclusion:
The Elastic security update addresses severe vulnerabilities in Kibana and Elasticsearch, including high-severity XSS issues that could enable attackers to compromise dashboards, steal data, or escalate privileges.
Although no exploitation has been reported but these vulnerabilities need immediate patching. Immediate action is essential to maintain system integrity and protect sensitive data in monitoring and logging environments.
References:
Fintech apps have gained momentum as Paypal, Mint, Gpay and Stash have transformed the way payment is made in financial service industries in the last few years. Fintech platforms are mostly subject to varying security standards striving the threat landscapes across different regions of geography.
In this blog we will discover how Fintech’s are growing at a pace and scaling up along with rising user base making it difficult for security teams to detect at the same pace and understand the attack surface vastness. As Fintech companies grow at pace, its impossible to keep growing with smaller infrastructure and security practices that may not be sufficient for smaller operations. Also growth in user base, makes it difficult with security teams to have proper visibility over an ever-expanding attack surface.
IntruceptLabs has a team of certified security experts who conduct manual penetration testing, identifying different business-centric vulnerabilities that an automated scan may not identify. GaarudNode from Intrucept provides a comprehensive security framework that ensures your applications are built, tested, and deployed with confidence.
The global aspect of operation in Fintech based organizations gives rise to data sovereignty issues, where some data must be within specific geographic limits.
The Fintech Service (FaaS) market from past few yrs is experiencing substantial growth and the global market is projected to increase by USD 806.9 billion by 2029. This growth is fueled by increasing demand for digital financial solutions and the adoption of FaaS among businesses of all sizes.FaaS provides agility, flexibility, and seamless integration, making it attractive for businesses.
Fintech’s mining Ground for cybercriminals
Apart from consumers and legitimate users across the globe, for cyber criminals Fintech’s are mining treasures as they can quiet probably gather or steal valuable personal and financial data.
Money is constantly flowing through various associated apps and we don’t know when and how bad actors will launch clever tactics and spill of money through various associated apps .This is making cyber security posture for fintech’s difficult.
Yes, Organizations can take up cyber skilling and training seriously and help staff to use phishing-resistant multifactor authentication and robust identity-verification measures. Organisation can take up security strategies and devise it keeping uniformity in enforcement practices and incident reporting requirements.
The past decade gave a consistent rise in the number and sophistication of cyberattacks targeting financial institutions as observed.
Now that is posing significant threats to the stability and trust within the financial ecosystem as financial losses increase due to cyber breaches or data hack and causing operational disruptions including reputational damage.
Navigating the risk & challenges affecting Fintech service (FaaS)
Fintech security is directly related to API security as API’s are responsible for smooth functioning of ‘Fintech as a platform’.
It is the same API’s that are prime target of cyber criminals as there has been increase in Cloud computing, mobile apps usage and Internet of Things (IoT) all have accelerated the adoption of APIs.
API’s are used by developers to integrate third party services ,also increase the functionable features and create solutions that are innovative in nature. Any flaw in API security could substantially damage the endpoints and is a common vulnerabilities. API ‘s can become insecure when endpoints finds failure to validate input, leading to injection attacks.
User identity Theft
Authentication vulnerabilities are issues that affect authentication processes and make websites and applications susceptible to security attacks in which an attacker can masquerade as a legitimate user.
Any flaw in authentication and authorization will give way to account compromises with insecure password that are crackable or single-factor authentication in systems lacking additional verification step. Authentication is a vital part of any website or application since it is simply the process of recognizing user identities.
Having authentication vulnerabilities have serious repercussions — whether it’s because of weak passwords or poor authentication design and implementation.
Threat actors use these vulnerabilities to get access into systems and user accounts to:
Supply chain risk or third party integration
Often fintech applications interact with external services or providers. Any weaknesses arising in Supply chain from backdoors are embedded within financial apps via compromised third-party code. So many Vendor fail the risk assessments as they are unable to identify risks well before integration.
Mostly fintech functions are mobile transfers require Apps interacting with traditional banks having legacy infrastructure to support. Integrating the modern high-tech apps with the legacy systems often used by established financial institutions is a difficult technical challenge.
Regulatory Compliance
Fintech firms operate under regulatory landscape that is complex and changing and must comply with various frameworks, including GDPR,PCI etc, and few local financial regulations based on geographical points or country wise .
These regulations add up to lot of over head expenses and if something overlaps
The regulations adds massive, unnecessary overhead, as requirements often overlaps creating chaos. Complying with local regulations, requires resources that can be diverted away from other security efforts.
Moreover, if a Fintech platform ventures into multiple markets, it must comply with local regulations, which often requires a race against time and diverts resources away from other security efforts.
Enterprise security can prevent cyber attacks by enforcing account lockouts, rate limiting, IP-based monitoring, application firewalls, and CAPTCHAs.
AI Soft Spot by Cyber criminals
Now cyber criminals are using AI and machine learning to automate the testing process and find zero-day vulnerabilities—especially in APIs. Perhaps the most observed impact AI has had on cybercrime has been an increase in scams, particularly those leveraging deepfake technology. In certain dark web forums where experimentation takes place, few threat actors are claiming to employ AI to bypass facial recognition technology, create deepfake videos and adopt techniques to summaries large amount of data.
Cyber security best practices for Faas
The outputs derived from assessment of security testing must encompass the entire attack surface, including APIs, mobile applications and other interfaces to develop roadmaps to improve security. In any event of security breach any incident response planning by organizations will help to identify, mitigate threat and recover.
GaarudNode from IntruceptLabs
GaarudNode is an all-in-one solution designed to empower development teams with the tools they need to secure their applications throughout the development lifecycle. By combining the power of SAST, DAST, SCA, API security, and CSPM, GaarudNode provides a comprehensive security framework that ensures your applications are built, tested, and deployed with confidence.
The dashboard presents findings with ratings and remediation steps, allowing developers to easily address critical issues.
What else you get from GaarudNode?
Sources: https:www.apisec.ai
Summary ; Security Advisory
Veeam disclosed three critical vulnerabilities affecting its widely deployed backup software. Veeam Backup & Replication is an enterprise-grade data protection solution used to back up, recover and replicate virtual machines, cloud workloads including physical servers.
| OEM | Veeam |
| Severity | Critical |
| CVSS Score | 9.9 |
| CVEs | CVE-2025-23121, CVE-2025-24286, CVE-2025-24287 |
| Actively Exploited | No |
| Exploited in Wild | No |
| Advisory Version | 1.0 |
Overview
Multiple high-impact vulnerabilities have been disclosed in Veeam Backup & Replication and Veeam Agent for Microsoft Windows, impacting versions prior to 12.3.2 and 6.3.2 respectively.
The most critical issue (CVE-2025-23121) may allow a remote code execution (RCE) on the backup server by an authenticated domain user, effectively granting complete control over backup infrastructure.
The vulnerabilities also include risks of unauthorized modification of backup jobs (CVE-2025-24286) and privilege escalation via local directory manipulation (CVE-2025-24287). These flaws could enable attackers to execute arbitrary code or gain elevated permissions.
These flaws pose significant risks to organizations relying on Veeam for data integrity and disaster recovery. The data protection system of an organization may get affected if compromised and threaten domain-joined backup servers.
| Vulnerability Name | CVE ID | Product Affected | Severity |
| Remote Code Execution via Authenticated Domain User | CVE-2025-23121 | Veeam Backup & Replication | Critical (9.9) |
| Arbitrary Code Execution via Backup Operator Role Abuse | CVE-2025-24286 | Veeam Backup & Replication | High (7.2) |
| Privilege Escalation via Directory Manipulation | CVE-2025-24287 | Veeam Agent for Microsoft Windows | Medium (6.1) |
Technical Summary
| CVE ID | System Affected | Vulnerability Details | Impact |
| CVE-2025-23121 | Veeam Backup & Replication 12.3.1.1139 and all earlier v12 builds | A remote code execution vulnerability affecting domain-joined Veeam backup servers. An authenticated domain user may execute arbitrary commands with elevated privileges. | Remote Code Execution |
| CVE-2025-24286 | Veeam Backup & Replication 12.3.1.1139 and earlier | Authenticated users with the Backup Operator role can modify backup job configurations to inject and execute code. | Arbitrary Code Execution |
| CVE-2025-24287 | Veeam Agent for Microsoft Windows 6.3.1.1074 and earlier | Local users can manipulate directory contents leading to code execution with elevated privileges. | Local Privilege Escalation |
Remediation:
Users are strongly advised to apply the following updates to mitigate the risks:
Here are some recommendations below
Conclusion: For Security Best practices
Veeam has released patches to address all three vulnerabilities and urged organizations to update Veeam Backup & Replication 12.3.2 (build 12.3.2.3617) and Veeam Agent for Microsoft Windows 6.3.2 (build 6.3.2.1205) as soon as possible.
For security best practices maintaining up-to-date backup systems, prompt patching and adherence to security best practices are essential to prevent potential exploitation and data compromise.
The critical nature of vulnerabilities demands backup and disaster recovery along with strict access controls and ongoing monitoring as essential tips to safeguard infrastructure that have been backed up from potential attacks.
References:
Summary
The FBI issued an alert warning of ongoing exploitation of 13 EOL Linksys/Cisco routers by cybercriminal groups operating the 5Socks and Anyproxy services.
The threat actors are using known vulnerabilities in outdated firmware to install malware, hijack routers, and leverage them as part of a botnet or proxy service used to mask malicious activities.
The malware establishes persistent access via regular communication with a command & control (C2) server, and affected devices are being rented out to other criminals.
The FBI strongly recommends replacing EOL devices with with newer and actively supported model or at least disabling remote management features immediately.
Technical Details
Attack Overview
Confirmed Vulnerable Devices
The FBI has identified the following end-of-life (EOL) routers from Cisco and Linksys as actively targeted in these campaigns:
Indicators of Compromise (IOCs)
Since the malware is router-based, it is difficult for an end user to know if their device is compromised due to the inability of antivirus tools to scan these devices.
Below is a list of files associated with the malware’s router exploitation campaign:
| Name | Hash |
| 0_forumdisplay-php_sh_gn-37-sh | 661880986a026eb74397c334596a2762 |
| 1_banana.gif_to_elf_t | 62204e3d5de02e40e9f2c51eb991f4e8 |
| 2_multiquote_off.gif_to_elf_gn-p_forward- hw-data-to-exploit-server | 9f0f0632b8c37746e739fe61f373f795 |
| 3_collapse_tcat_gif_sh_s3-sh | 22f1f4c46ac53366582e8c023dab4771 |
| 4_message_gif_to_elf_k | cffe06b0adcc58e730e74ddf7d0b4bb8 |
| 5_viewpost_gif_to_elf_s | 084802b4b893c482c94d20b55bfea47d |
| 6_vk_gif_to_elf_b | e9eba0b62506645ebfd64becdd4f16fc |
| 7_slack_gif_DATA | 41e8ece38086156959804becaaee8985 |
| 8_share_gif_DATA | 1f7b16992651632750e7e04edd00a45e |
| banana.gif-upx | 2667a50869c816fa61d432781c731ed2 |
| message.gif-upx | 0bc534365fa55ac055365d3c31843de7 |
Recommended Mitigations:
“End of life routers were breached by cyber actors using variants of TheMoon malware botnet,” reads the FBI bulletin.
“Recently, some routers at end of life, with remote administration turned on, were identified as compromised by a new variant of TheMoon malware. This malware allows cyber actors to install proxies on unsuspecting victim routers and conduct cyber crimes anonymously.”
References: