Latest Stories

Stay up-to-date with everything at Approach

Blog article

Weekly Digest Week 25 – 2025

Publication date

20.06.2025

Featured Story

New Veeam RCE Flaw Lets Domain Users Hack Backup Servers

Veeam has patched a critical vulnerability (CVE-2025-23121) in its Backup & Replication software that allows authenticated domain users to remotely execute arbitrary code on backup servers. This affects Veeam Backup & Replication 12 and later, and has been resolved in version 12.3.2.3617.

The flaw, rated 9.9 on the CVSS scale, can be exploited by any authenticated domain user in vulnerable environments, making it a severe risk to infrastructure integrity and business continuity.

SOC Analysis: Backup infrastructure is a prime target during ransomware campaigns, and this vulnerability offers a direct path to it. Veeam installations connected to a domain must be patched immediately. Monitoring for unusual domain user behavior and reinforcing access controls are also essential during remediation.

Other Stories

Critical Grafana Vulnerability Affects 46,000+ Unpatched Instances

CVE-2025-4123, a client-side open redirect vulnerability in Grafana, allows malicious plugin execution and account takeover. Over 46,000 internet-facing instances remain unpatched, exposing organizations to hijacking and server-side request forgery (SSRF) attacks.

SOC Analysis: This is a textbook example of the risks tied to unpatched public services. Admins must apply the latest security updates and audit plugin configurations and anonymous access settings to mitigate potential exposure.

High-Severity Vulnerabilities Patched in Tenable Nessus Agent

Three privilege escalation flaws in Nessus Agent for Windows (CVE-2025-36631 to -36633) allow non-admin users to gain SYSTEM-level privileges. These bugs affect versions prior to 10.8.5, which has now been released with fixes.

SOC Analysis: Exploiting vulnerability scanning infrastructure gives attackers wide visibility into systems. Immediate patching is necessary, especially in large enterprises where Nessus Agents are broadly deployed.

Warning: Fake Message About Tax Returns in Circulation

Phishing emails disguised as official tax return reminders from FPS Finance are spreading, directing users to fake websites. Victims are tricked into clicking malicious links under the guise of official correspondence.

SOC Analysis: Phishing campaigns often exploit trusted institutions and seasonal activity. Always verify sender details and URLs before engaging. Report suspicious messages to suspicious@safeonweb.be or contact our SOC for assistance.

OTHER STORIES

Contact us to learn more about our services and solutions

Our team will help you start your journey towards cyber serenity

Do you prefer to send us an email?