Cyble’s vulnerability intelligence unit examined 26 vulnerabilities and 14 dark web exploit claims in recent reports to clients and flagged 10 of the vulnerabilities as meriting high-priority attention by security teams.
The vulnerabilities, which can lead to system compromise and data breaches, affect Fortinet products, WordPress plugins, Linux and Android systems, and more.
Here are some of the vulnerabilities highlighted by Cyble vulnerability intelligence researchers in recent reports.
CVE-2022-42475, CVE-2023-27997, and CVE-2024-21762 are critical vulnerabilities in Fortinet FortiGate devices that have been actively exploited to gain unauthorized remote access. CVE-2022-42475 is a heap-based buffer overflow vulnerability in the SSL-VPN component that allows remote code execution, while the other two enable initial access and privilege escalation.
Recently, Fortinet revealed that attackers exploited these vulnerabilities to gain initial access and then used a novel post-exploitation technique to maintain persistent read-only access even after patches were applied. This technique involves creating a symbolic link (symlink) in the SSL-VPN language files folder that connects the user file system to the root file system, allowing attackers to evade detection and continue accessing device configurations.
CVE-2024-48887 is a critical unverified password change vulnerability in the Fortinet FortiSwitch GUI that could allow a remote, unauthenticated attacker to change administrator passwords without prior access by sending specially crafted HTTP requests to the set_password endpoint, which lacks proper input validation and authentication checks. This could enable the attacker to gain administrative privileges on the vulnerable FortiSwitch device, potentially allowing them to manipulate configurations or move laterally within internal networks.
Cyble’s ODIN vulnerability search tool has identified nearly 1 million potentially exposed Fortinet instances:
CVE-2025-3102 is a critical authentication bypass vulnerability in the SureTriggers: All-in-One Automation Platform plugin for WordPress, affecting versions up to and including 1.0.78. The flaw could allow unauthenticated attackers to create administrator accounts on websites where the plugin is installed and activated but not configured with an API key. The issue arises due to a missing empty value check on the ‘secret_key’ parameter in the plugin’s authentication function, potentially enabling attackers to bypass authentication by sending an empty authorization header.
CVE-2024-53197 is a vulnerability in the Linux kernel’s ALSA USB audio driver. It affects systems using USB audio devices, particularly Extigy and Mbox devices. The vulnerability involves potential out-of-bounds memory access that could occur when a malicious USB device provides an invalid bNumConfigurations value, potentially leading to system crashes or privilege escalation if an attacker has physical access to the system. Serbian authorities reportedly exploited the flaw to unlock confiscated Android devices as part of a zero-day exploit chain.
CVE-2025-31334 is a vulnerability affecting WinRAR, a popular file archiver utility for Windows, that could allow attackers to bypass the Windows “Mark of the Web” (MotW) security feature. This feature is designed to flag files downloaded from the internet as potentially unsafe and prompt users with a warning before executing them. Attackers could craft a malicious archive containing a symbolic link (symlink) pointing to an executable file. When opened using a vulnerable version of WinRAR, the MotW warning is bypassed, allowing the executable to run without user confirmation.
CVE-2025-30065 is a critical remote code execution (RCE) vulnerability in the Apache Parquet Java library, specifically affecting the parquet-avro module. Attackers could potentially create a malicious Parquet file that allows them to execute arbitrary code when imported into a vulnerable system. This typically requires social engineering tactics to convince users to open the malicious file. The vulnerability has a maximum CVSS score of 10.0, indicating high severity and ease of exploitation.
Cyble researchers also observed multiple threat actors on dark web forums discussing exploits and weaponizing different vulnerabilities, including some claimed zero-day vulnerabilities. Some of the vulnerabilities under discussion include:
To protect against vulnerabilities and exploits, Cyble recommends that organizations implement the following best practices:
Security teams should prioritize actively exploited vulnerabilities—and those at high risk of exploitation—when determining their patching efforts. They should also consider other indicators of risk, such as web exposure, data, and application sensitivity.
Implementing strong security practices is essential for protecting sensitive data and maintaining system integrity. A comprehensive attack surface management solution like Cyble can monitor for threats, vulnerabilities, and leaks specific to your environment, helping you harden cyber defenses and respond quickly to events before they become bigger incidents.
To access full IT vulnerability and other reports from Cyble, click here.
Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.