Botnets Evolve While Exploits Target Critical Systems

January 6, 2025
Executive Summary
Trending / Critical Vulnerabilities
Exploit Activity and Mass Scanning Observed on Cytellite Sensors
Vulnerabilities abused by Botnet
Vulnerabilities Abused by Malware
PRE-NVD observed for this week
External References
Subscribe to our Reports

Executive Summary

This week saw the addition of a single vulnerability to the CISA KEV catalog, involving a critical issue in Palo Alto Networks systems.  Active exploitation has been observed in Four-Faith industrial routers, raising alarms about the need for immediate patching.  Researchers have also released proof-of-concept exploit code for high-impact vulnerabilities in Microsoft Windows, Linux kernel, Apache Traffic Control, and DrayTek gateway devices, amplifying the risk to unpatched systems and critical infrastructure.  

Botnet activity has notably intensified, with emerging threats like Zerobot targeting Tenda WiFi routers and Andoryu exploiting vulnerabilities in GitLab. Meanwhile, IoT-specific botnets, such as IoT Reaper and AndroxGh0St, persist in attacking Cisco routers and PHP Unit. Legacy threats like Mirai and Tsunami are exploiting an eight-year-old flaw in the Eir D1000 modem, underscoring the significant dangers posed by outdated and unsupported infrastructure.  

Adding to the concerns, Fortinet has observed a surge in botnet activity involving Ficora and Capsaicin. These botnets have been actively exploiting end-of-life vulnerabilities in D-Link devices, spotlighting the persistent risks associated with unsupported hardware.

Trending / Critical Vulnerabilities

Current trending vulnerabilities offer insights into the latest emerging and widely discussed threats, helping to make informed decisions.  

CVE-2024-3393

Palo Alto Networks has patched a high severity denial-of-service (DoS) vulnerability in the DNS Security feature of PAN-OS software. This vulnerability, now listed in the CISA KEV catalog, can be triggered by a maliciously crafted packet sent through the firewall's data plane, causing it to reboot and enter a DoS state. Multiple exploit attempts could even force the firewall into maintenance mode.  Immediate mitigation through patching is strongly recommended to avoid potential disruptions.

CVE-2024-12856

VulnCheck has issued an alert regarding the active exploitation of high-severity vulnerability in Four-Faith industrial routers. This unauthenticated operating system command injection vulnerability allows attackers to remotely execute arbitrary commands on vulnerable devices. With a high CVSS Score of 7.2, the vulnerability affects the F3x24 and F3x36 versions of the routers, posing a significant risk to systems still using these versions.  

CVE-2024-12987

A command injection vulnerability has been identified in the web management interface of DrayTek gateway devices, allowing attackers to execute arbitrary commands remotely. With a high CVSS of 7.3, this flaw affects DrayTek Vigor 2960 and DrayTek Vigor 300B devices running version 1.5.1.4. The availability of proof-of-concept (PoC) exploit code further increases the risk, making it crucial for organizations to address this vulnerability promptly to safeguard their systems.

CVE-2024-45387

Apache Traffic control versions 8.0.0 to 8.0.1 are vulnerable to a critical SQL injection flaw with a CVSS of 9.9. This vulnerability allows users with specific rules, including 'admin', 'federation', 'operations', 'portal', or 'steering', to execute arbitrary SQL commands on the database through a specially crafted PUT request. The recent release of a proof-of-concept (PoC) exploit on GitHub has heightened the urgency, as it lowers the barrier for attackers to exploit unpatched systems.  

CVE-2024-49112

SafeBreach Labs has uncovered a critical zero-click vulnerability in the Windows Lightweight Directory Access Protocol (LDAP) service, dubbed "LDAP Nightmare," with a CVSS score of 9.8. This flaw requires no authentication or preconditions, other than Internet connectivity to the DNS server, making it a highly accessible attack vector. Exploiting this vulnerability can trigger a crash in the Local Security Authority Subsystem Service (LSASS), effectively causing unpatched Windows Servers to crash through malicious LDAP queries.

CVE-2023-4147

A use-after-free (UAF) vulnerability has been identified in the Linux kernel's Netfilter framework, impacting versions v5.9-rc1 to v6.5-rc3, with a high CVSS score of 7.8.  This flaw arises from improper handling of the NFTA_RULE_CHAIN_ID during rule additions, allowing authenticated attackers to escalate privileges or cause system crashes. The vulnerability occurs when a rule bypasses normal restrictions and is added to a bound chain using NFTA_RULE_CHAIN_ID, creating an inconsistency. If a chain with the NFT_CHAIN_BINDING flag links to an immediate expression that is subsequently destroyed, it leads to the destruction of the bound chain and its associated rules, triggering the UAF flaw. With a proof-of-concept (PoC) exploit publicly available, it is imperative for system administrators to patch affected systems promptly.

Exploit Activity and Mass Scanning Observed on Cytellite Sensors

Telemetry collected from Loginsoft sensors were analyzed and processed to derive insights on what is actively being exploited and actively being scanned.  As source of truth, source IPv4 addresses & payloads can be provided on need-to-know basis.

Vulnerabilities Product Severity Title Exploited – in-the-wild CISA KEV
CVE-2024-47176 OpenPrinting CUPS Medium Improper Input Validation vulnerability in OpenPrinting CUPS browsed through 2.0.1 leads to remote code execution True False
CVE-2023-38646 Metabase open source/Enterprise Critical Remote code execution vulnerability in Metabase open source and Metabase Enterprise False False
CVE-2023-23752 Joomla Medium Joomla! Improper Access Control Vulnerability True
CVE-2023-24488 Citrix ADC and Citrix Gateway Medium Cross site scripting vulnerability in Citrix ADC and Citrix Gateway True False
CVE-2022-41040 Microsoft Exchange Server High Server-Side Request Forgery Vulnerability in Microsoft Exchange Server True True
CVE-2022-22947 Spring Cloud Gateway Critical Remote code execution vulnerability in Spring Cloud Gateway prior to 3.1.1+ and 3.0.7+ True True
CVE-2022-24847 GeoServer High Improper input validation vulnerability in GeoServer leads to arbitrary code execution False False
CVE-2022-30023 Tenda Devices High Command injection vulnerability via the Ping function in Tenda Products False False
CVE-2022-25168 Apache Hadoop Critical Command injection vulnerability in org.apache.hadoop.fs.FileUtil.unTarUsingTar in Apache Hadoop False False
CVE-2021-41773 Apache HTTP Server High Path traversal vulnerability in Apache HTTP Server True True
CVE-2021-38647 Open Management Infrastructure Critical Remote Code Execution Vulnerability in Open Management Infrastructure True True
CVE-2021-27905 Apache Solr Critical Server side request forgery (SSRF) vulnerability in the ReplicationHandler in Apache Solr True False

Vulnerabilities abused by Botnet

Identified vulnerabilities exploited by botnets, including recent CVEs logged in Misp. Presenting the top 5 CVEs with payloads suggestive of botnet activities, like utilizing wget with IP addresses.

Vulnerability Product Title Exploit Abused by Botnet
CVE-2022-30023 Tenda ONT GPON AC1200 Dual band WiFi HG9 v1.0.1 Command injection vulnerability via the Ping function in Tenda ONT GPON AC1200 Dual band WiFi HG9 v1.0.1 True Zerobot
CVE-2021-22205 Gitlab-Exiftool Remote code execution vulnerability in Gitlab-Exiftool True Andoryu
CVE-2017-9841 Util/PHP/eval-stdin.php in PHPUnit Arbitrary PHP code execution vulnerability in Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 True AndroxGh0st
CVE-2016-10372 Eir D1000 modem Improper protocol access control vulnerability in Eir D1000 modem True Bashlite
BrickerBot
Tsunami
Mirai
CVE-2013-2678 Cisco Linksys E4200 1.0.05 Build 7 routers Local file inclusion Vulnerability in Cisco Linksys E4200 1.0.05 Build 7 routers leads to obtain sensitive information or execute arbitrary code True IoTReaper

Vulnerabilities Abused by Malware

We proactively monitor the vulnerabilities which are targeted by adversaries. Each vulnerability is humanly studied and mapped with Mitre ATT&CK tactics and techniques. Source of information is derived from our vulnerability intelligence platform collected and curated information from various sources such as Twitter, Telegram, OSINT groups, Blogs, Data leak Sites and more.

Botnets Exploiting End-of-Life D-Link Devices

FortiGuard Labs observed a surge in activity from two botnets: the Mirai variant "FICORA" and the Kaiten variant "CAPSAICIN." Both botnets exploit long-standing vulnerabilities in D-Link devices, leveraging weaknesses in the Home Network Administration Protocol (HNAP) interface. Specifically, attackers use the GetDeviceSettings action to execute malicious commands remotely. Notably, this HNAP vulnerability was first disclosed nearly a decade ago, yet it continues to be a vector for widespread exploitation, underscoring the critical need for regular patching and robust security measures.

Vulnerability Severity Title Patch Targeted By Malware OSS
CVE-2024-33112 High Command injection vulnerability in the D-Link DIR845L routers through the hnap_main() function. No FICORA
CAPSAICIN
False
CVE-2022-37056 Critical Command injection vulnerability in D-Link GO-RT-AC750 via /cgi-bin, hnap_main function. No FICORA
CAPSAICIN
False
CVE-2019-10891 Critical Command injection vulnerability in the hnap_main function of D-Link DIR-806 devices. No FICORA
CAPSAICIN
False
CVE-2015-2051 Critical Command Injection vulnerability in D-Link DIR-645 Wired/Wireless Router. No FICORA
CAPSAICIN
False

PRE-NVD observed for this week

It refers to vulnerabilities discovered and potentially exploited before their official inclusion in the National Vulnerability Database. The LOVI Platform aggregates and distributes data from open sources and social media, currently tracking over 100 security alerts and planning to expand.

CVE-ID Type of Vulnerability Product Reference
CVE-2024-55919 Improper input validation Sympa Resource
CVE-2024-6914 Authentication Bypass WSO2 API Manager Resource
CVE-2024-12833 Cross-Site Scripting Paessler PRTG Network Monitor Resource
CVE-2024-7074 Unrestricted File Upload WSO2 API Manager Resource
CVE-2024-6437 Improper access control Arista's EOS Resource

External References

  1. https://www.cisa.gov/news-events/alerts/2024/12/30/cisa-adds-one-known-exploited-vulnerability-catalog  
  2. https://vulncheck.com/blog/four-faith-cve-2024-12856  
  3. https://netsecfish.notion.site/Command-Injection-in-apmcfgupload-endpoint-for-DrayTek-Gateway-Devices-1676b683e67c8040b7f1f0ffe29ce18f  
  4. https://securityonline.info/66000-draytek-gateways-vulnerable-to-remote-command-injection-cve-2024-12987-poc-published/  
  5. https://www.fortinet.com/blog/threat-research/botnets-continue-to-target-aging-d-link-vulnerabilities  
  6. https://securityonline.info/linux-kernel-vulnerability-cve-2023-4147-poc-exploit-published-for-privilege-escalation-flaw/  
  7. https://securityonline.info/poc-exploit-released-for-zero-click-vulnerability-cve-2024-49112-in-windows/

Get notified

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Latest Reports

Latest Reports