Blog

JumpServer Connection Token Improper Authentication Vulnerability (CVE-2025-62712) Notice

November 7, 2025 | NSFOCUS

Overview Recently, NSFOCUS CERT detected that JumpServer issued a security bulletin to fix the JumpServer connection token improper authentication vulnerability (CVE-2025-62712); Due to improper authentication of JumpServer’s /api/v1/authentication/super-connection-token/hyper-connected endpoint, attackers with low-privilege accounts can obtain the connection tokens of all system users and connect to managed assets as them, thereby achieving unauthorized access and privilege […]

NSFOCUS in SAS 2025: Unveiling Secrets Behind Large-Scale DDoS Attacks on AI Platform and Social Media

November 4, 2025 | NSFOCUS

SANTA CLARA, Calif., November 4, 2025 – The 18th Global Security Analyst Summit (SAS) concluded successfully in Khao Lak, Thailand. Focused on the complexity of APT attacks, the summit exposed the latest attack activities from Hacking Team and disclosed multiple major security risk incidents. It gathered top global cybersecurity experts, academic elites, and law enforcement representatives to […]

Apache Tomcat Path Traversal Vulnerability (CVE-2025-55752) Notice

October 29, 2025 | NSFOCUS

Overview Recently, NSFOCUS CERT detected that Apache issued a security bulletin to fix the Apache Tomcat path traversal vulnerability (CVE-2025-55752); This vulnerability is a flaw introduced when fixing CVE-2016-5388. Since the rewritten URL is normalized before URL decoding, if the system is configured with rewrite rules to rewrite query parameters into the URL, an authenticated […]

Windows Server Update Service (WSUS) Remote Code Execution Vulnerability (CVE-2025-59287) Notice

October 22, 2025 | NSFOCUS

Overview Recently, NSFOCUS CERT detected that Microsoft released a security update that fixed the Windows Server Update Service (WSUS) remote code execution vulnerability (CVE-2025-59287); Because WSUS’s GetCookie does not perform type verification when processing objects, an unauthenticated attacker can achieve remote code execution by deserializing malicious data to control the target server. The CVSS score […]

Beware of the Risk of Open-Source License Changes

October 22, 2025 | NSFOCUS

It is not uncommon for open source licenses to change. When licenses change, users often need to re-evaluate compliance risks. Take Redis as an example. Redis is a popular key-value store whose open source license has undergone changes from BSD to SSPL and then to AGPL, which has caused widespread discussion and controversy in the […]

Samba WINS Command Injection Vulnerability (CVE-2025-10230) Notice

October 17, 2025 | NSFOCUS

Overview Recently, NSFOCUS CERT detected that Samba released a security update to fix the Samba WINS command injection vulnerability (CVE-2025-10230); Since WINS when Samba is used as an AD domain controller does not strictly verify the wins hook script command when processing registration messages, unauthenticated attackers can construct a special host name to inject commands […]

Microsoft Security Update in October of High-Risk Vulnerability Notice in Multiple Products

October 16, 2025 | NSFOCUS

Overview On October 15, NSFOCUS CERT detected that Microsoft released the October Security Update patch, fixing 175 security issues involving widely used products such as Windows, Microsoft Office, Azure, Apps, Microsoft Exchange Server, and Microsoft Visual Studio. These include high-risk vulnerability types such as privilege escalation and remote code execution. Among the vulnerabilities fixed by […]

Oracle E-Business Suite Remote Code Execution Vulnerability (CVE-2025-61882) Notice

October 11, 2025 | NSFOCUS

Overview Recently, NSFOCUS CERT detected that Oracle issued a security bulletin to fix the remote code execution vulnerability (CVE-2025-61882) in Oracle E-Business Suite; Because Oracle Concurrent Processing (BI Publisher Integration) of Oracle E-Business Suite does not strictly validate and filter user input, unauthenticated attackers can use SSRF, CRLF injection, Vulnerability chains such as path traversal […]

Redis Lua Code Execution Vulnerability (CVE-2025-49844) Notice

October 9, 2025 | NSFOCUS

Overview Recently, NSFOCUS CERT detected that Redis issued a security bulletin and fixed the Redis Lua code execution vulnerability (CVE-2025-49844); Because Redis’s Lua script engine has a use-after-free reuse vulnerability when handling memory management, an authenticated attacker can write a specially crafted Lua script to manipulate the memory recycling mechanism and execute the Lua script […]

GovWare 2025: Join NSFOCUS at Booth D09!

October 6, 2025 | NSFOCUS

NSFOCUS is thrilled to announce our participation in GovWare 2025—taking place from 21 to 23 October 2025 at the Sands Expo and Convention Centre, Singapore. We invite all attendees to visit us at Booth D09, where we’ll showcase game-changing solutions designed to redefine security operations and safeguard AI-driven environments. With over two decades of expertise serving governments, […]