Zero-Days, Active Exploits, and Botnets: Key Cybersecurity risks of the week

January 31, 2025
Executive Summary
Trending / Critical Vulnerabilities
Exploit Activity and Mass Scanning Observed on Cytellite Sensors
Vulnerabilities abused by Botnet
Vulnerabilities Abused by Malware
PRE-NVD observed for this week
External References
Subscribe to our Reports

Executive Summary

This week, CISA expanded its Known Exploited Vulnerabilities (KEV) catalog with two critical additions, one affecting SonicWall and another targeting Apple, both of which were actively exploited as zero-days. Meanwhile, GreyNoise flagged active exploitation attempts in Zyxel CPE devices and multiple Fortinet products, signaling ongoing threats in enterprise security.

The botnet ecosystem remains relentless, with EnemyBot and Sysrv-K exploiting vulnerabilities in Spring Cloud Gateway, while Mozi, Andr0xgh0st, Tsunami, Spytech Necro, and Sysrv targeted Atlassian products.  

In a concerning development, the Mirai-based Aquabot botnet has evolved into a new variant, Aquabotv3, which is actively targeting Mitel SIP phones and exploiting known vulnerabilities across various devices.   Researchers have also identified that the Mirai botnet is exploiting an unpatched flaw in Zyxel CPE devices, enabling it to launch large-scale IoT-driven DDoS attacks.

With escalating exploitation trends and botnets adapting rapidly, organizations must stay vigilant, prioritize patching, and bolster their defenses against these evolving threats.

Trending / Critical Vulnerabilities

Current trending vulnerabilities offer insights into the latest emerging and widely discussed threats, helping to make informed decisions.  

CVE-2025-23006

A Deserialization of Untrusted Data Vulnerability has been identified in SonicWall SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC), affecting versions 12.4.3-02804 and earlier. Discovered and reported by the Microsoft Threat Intelligence Center (MSTIC) as a zero-day, this flaw allows unauthenticated attackers to execute arbitrary code on vulnerable devices, posing a severe security risk. With a CVSS score of 9.8, this vulnerability has been added to the CISA Known Exploited Vulnerabilities (KEV) catalog, emphasizing the urgent need for mitigation.

CVE-2025-24085

A Use-After-Free Vulnerability in Apple's Core Media Component could enable a malicious application already installed on the device, to escalate its privileges. Apple has released a security update to address this vulnerability which was actively exploited as a zero-day. In response, CISA has added this vulnerability to its KEV catalog, urging users to apply the patch promptly to mitigate potential risks.

CVE-2024-40891  

A Command Injection Vulnerability in Zyxel CPE devices allows attackers to execute arbitrary commands, potentially leading to full system compromise, data exfiltration, or network infiltration. Despite being first reported by VulnCheck in 2024, this flaw remains unpatched and unacknowledged by the vendor, increasing the risk of exploitation. Recently, GreyNoise has observed active attacks targeting this vulnerability, highlighting the urgency for organizations to implement mitigations, such as restricting access to administrative interfaces and monitoring for suspicious activity.  

CVE-2024-41710

A Command Injection Vulnerability affecting Mitel 6800, 6900 and 6900w series SIP phones, including the 6970 Conference Unit, could enable attackers to execute arbitrary commands within the phone's environment. In August 2024, Kyle Burns of PacketLabs released a proof-of-concept (PoC) exploit code demonstrating that the flaw stemmed from improper sanitization of user-supplied input. According to a recent report from Akamai, the first known exploitation attempts targeting this vulnerability emerged in January 2025, roughly six months after its initial disclosure. The vulnerability is now under active exploitation, with attacks leveraging it to gain control over vulnerable devices.  

CVE-2022-40684

An Authentication Bypass Vulnerability in the Fortinet FortiOS, FortiProxy and FortiSwitchManager enables unauthenticated attackers to execute administrative operations via specially crafted HTTP or HTTPS requests. Despite Fortinet releasing patches in October 2022, thousands of devices remained unpatched. GreyNoise has identified over 15,000 exposed Fortinet FortiGate firewalls, with attackers actively exploiting the flaw for malicious purposes.

Exploit Activity and Mass Scanning Observed on Cytellite Sensors

Telemetry collected from Loginsoft sensors were analyzed and processed to derive insights on what is actively being exploited and actively being scanned.  As source of truth, source IPv4 addresses & payloads can be provided on need-to-know basis.

Vulnerabilities Product Severity Title Exploited – in-the-wild CISA KEV
CVE-2024-47176 CUPS Medium Improper Input Validation Vulnerability in OpenPrinting CUPS browsed through 2.0.1 leads to remote code execution True False
CVE-2023-23752 Joomla Medium Improper Access Control Vulnerability in Joomla! True True
CVE-2023-26801 LB-LINK Critical Command Injection Vulnerability in LB-LINK devices. True False
CVE-2023-38646 Metabase open source and Enterprise Critical Remote Code Execution Vulnerability in Metabase open source and Metabase Enterprise True False
CVE-2023-46747 F5 BIG-IP Critical Authentication Bypass Vulnerability in F5 BIG-IP Configuration utility True True
CVE-2022-22947 Spring Cloud Gateway Critical Remote Code Execution Vulnerability in Spring Cloud Gateway prior to 3.1.1+ and 3.0.7+ True True
CVE-2022-24847 GeoServer High Improper Input Validation Vulnerability in GeoServer leads to arbitrary code execution False False
CVE-2022-25168 Hadoop Critical Command Injection Vulnerability in org.apache.hadoop.fs.FileUtil.unTarUsingTar in Apache Hadoop False False
CVE-2022-30023 Tenda Devices High Command Injection Vulnerability via the Ping function in Tenda Products False False
CVE-2022-41040 Microsoft Exchange Server High Server-Side Request Forgery Vulnerability in Microsoft Exchange Server True True
CVE-2022-47945 ThinkPHP Framework Critical Path Traversal Vulnerability in ThinkPHP Framework leads to arbitrary code execution False False
CVE-2021-27905 Solr Critical Server-Side Request Forgery Vulnerability in the Replication Handler in Apache-Solr. True False
CVE-2021-38647 Open Management Infrastructure Critical Remote Code Execution Vulnerability in Open Management Infrastructure True True
CVE-2021-41773 HTTP Server High Path Traversal Vulnerability in Apache HTTP Server True True

Vulnerabilities abused by Botnet

Identified vulnerabilities exploited by botnets, including recent CVEs logged in Misp. Presenting the top 5 CVEs with payloads suggestive of botnet activities, like utilizing wget with IP addresses.

Vulnerability Product Title Exploit Abused by Botnet
CVE-2022-22947 Spring Cloud Gateway Remote Code Execution Vulnerability in Spring Cloud Gateway prior to 3.1.1+ and 3.0.7+ True EnemyBot
Sysrv-K
CVE-2021-26086 Atlassian Jira Server and Data Center Path Traversal vulnerability in Atlassian Jira Server and Data Center leads to read of data files in the /WEB-INF/web.xml endpoint True MOZI
Androxgh0st
CVE-2021-26084 Atlassian Confluence Server and Data Center OGNL injection vulnerability in Confluence Server and Data Center leads to arbitrary code execution True Tsunami
N3Cr0m0rPh
Sysrv

Vulnerabilities Abused by Malware

We proactively monitor the vulnerabilities which are targeted by adversaries. Each vulnerability is humanly studied and mapped with Mitre ATT&CK tactics and techniques. Source of information is derived from our vulnerability intelligence platform collected and curated information from various sources such as Twitter, Telegram, OSINT groups, Blogs, Data leak Sites and more.  

CVE-2024-40891

According to GreyNoise Security, researchers have found a striking overlap between IPs leveraging CVE-2024-40891 and those previously associated with Mirai botnet operations. This indicates that certain strains of Mirai have adopted the exploit, significantly increasing their potential for massive IoT-driven DDoS campaigns.

Aquabotv3: The Evolving Threat Targeting Mitel SIP Phones

The Akamai Security Intelligence and Response Team (SIRT) has uncovered a new variant of the Mirai-based malware, Aquabot, which is actively exploiting Mitel SIP phones. This latest evolution, identified as Aquabotv3, marks the third distinct iteration of this botnet malware. The botnet primarily targets CVE-2024-41710, a command injection vulnerability affecting Mitel devices. However, its exploitation efforts extend beyond this flaw, also leveraging vulnerabilities such as CVE-2023-26801, CVE-2022-31137, CVE-2018-10561, CVE-2018-10562, CVE-2018-17532 and a remote code execution vulnerability in Linksys E-series devices.

Vulnerability Severity Title Patch Targeted By Malware OSS
CVE-2024-40891 High Arbitrary Command Execution Vulnerability in Zyxel CPE via Telnet No Mirai False
CVE-2024-41710 Medium Command Injection Vulnerability in the Mitel 6800 series, 6900 series, and 6900w Series SIP phones, including the 6970 Conference Unit Yes Aquabotv3 False
CVE-2023-26801 Critical Command Injection Vulnerability in LB-LINK BL-AC1900_2.0 1.0.1, BL-WR9000 2.4.9, BL-X26 1.2.5 and BL-LTE300 1.0.8 No Aquabotv3 False
CVE-2022-31137 Critical Remote Code Execution Vulnerability in Roxy-WI Yes Aquabotv3 False
CVE-2018-10561 Critical Authentication Bypass Vulnerability in Dasan GPON home routers No Aquabotv3 False
CVE-2018-10562 Critical OS Command Injection Vulnerability in Dasan GPON home routers No Aquabotv3 False
CVE-2018-17532 Critical OS Command Injection Vulnerability in Teltonika RUT9XX routers with firmware before 00.04.233 Yes Aquabotv3 False

PRE-NVD observed for this week

It refers to vulnerabilities discovered and potentially exploited before their official inclusion in the National Vulnerability Database. The LOVI Platform aggregates and distributes data from open sources and social media, currently tracking over 100 security alerts and planning to expand.

CVE-ID Type of Vulnerability Product Reference
CVE-2025-0142 Information Disclosure Zoom Plugin Resource
CVE-2025-0570 Memory Corruption Sante PACS Server Resource
CVE-2025-0589 Authentication Bypass Octopus Server Resource
CVE-2025-23085 Memory Leak Node.js Resource
CVE-2024-44449 Reflected Cross-Site Scripting Quorum onQ OS Resource

External References

  1. https://www.cisa.gov/news-events/alerts/2025/01/29/cisa-adds-one-known-exploited-vulnerability-catalog  
  2. https://www.cisa.gov/news-events/alerts/2025/01/24/cisa-adds-one-known-exploited-vulnerability-catalog
  3. https://www.akamai.com/blog/security-research/2025-january-new-aquabot-mirai-variant-exploiting-mitel-phones
  4. https://www.greynoise.io/blog/hackers-actively-exploiting-fortinet-firewalls-real-time-insights-from-greynoise
  5. https://vulncheck.com/blog/initial-access-intelligence-july-2024
  6. https://www.theregister.com/2025/01/28/apple_cve_2025_24085/
  7. https://www.greynoise.io/blog/active-exploitation-of-zero-day-zyxel-cpe-vulnerability-cve-2024-40891

Get notified

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Latest Reports

Latest Reports