Cyble’s vulnerability intelligence unit analyzed 17 vulnerabilities in a report to clients last week – and highlighted two that are at exceptionally high risk of exploitation.
Cyble Research and Intelligence Labs (CRIL) researchers also investigated 6 vulnerability exploits claimed by threat actors on the dark web, including a purported zero-day exploit for a Local Privilege escalation vulnerability in the Windows operating system. The threat actor was asking $70,000 USD for the exploit.
Here are some highlights from the weekly IT vulnerability intelligence report, and other Cyble reports last week.
Here are the two vulnerabilities highlighted by Cyble researchers for priority patching and mitigation by security teams.
CVE-2025-24201: This vulnerability in Apple’s WebKit web browser engine has been exploited in “extremely sophisticated” attacks. The vulnerability is an out-of-bounds write issue that allows an attacker to craft malicious web content to break out of the Web Content sandbox, potentially leading to unauthorized actions on the system. Patches are available.
CVE-2024-4577: Cyble has been detecting consistent attacks on this vulnerability since it was first reported in May 2024, and there are still more than 4 million vulnerable web-facing instances. The flaw is a critical remote code execution (RCE) vulnerability in PHP, specifically affecting Windows-based installations running in CGI mode. The vulnerability allows attackers to execute arbitrary code on a remote server by exploiting how Windows handles certain characters in URLs, particularly when the system locale is set to Chinese or Japanese. The vulnerability can be exploited even if PHP is not explicitly configured in CGI mode, as the PHP-CGI module is embedded in some web servers like IIS and XAMPP.
Researchers recently observed that attackers are mass-exploiting the vulnerability, with a significantly increased number of targets observed in the United States, Singapore, Japan, and other countries since January 2025.
Last week also included Patch Tuesday for Microsoft and other vendors. Notable vulnerabilities include 16 high-risk and zero-day Microsoft vulnerabilities and 9.8-severity vulnerabilities in Ivanti Endpoint Manager and Advantive VeraCore.
To protect against these vulnerabilities and exploits, Cyble recommends that organizations implement the following best practices:
Security teams should prioritize actively exploited vulnerabilities—and those at high risk of exploitation—while also considering other indicators of risk, such as internet exposure and data and application sensitivity.
Implementing strong security practices is essential for protecting sensitive data and maintaining system integrity. A comprehensive threat intelligence solution like Cyble can monitor for threats, exposures, and leaks specific to your environment, giving you the ability to respond quickly to events before they become more significant incidents.
To access complete IT vulnerability and other reports from Cyble, click here.
Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.