{"vulnerability": "CVE-2025-2300", "sightings": [{"uuid": "84a6192f-eadf-4a55-8721-5d758f74897a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/cti-news.bsky.social/post/3lgfscscsxs27", "content": "", "creation_timestamp": "2025-01-23T11:39:53.360781Z"}, {"uuid": "10873093-3001-4726-9d07-c49faf4412a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-23006", "type": "seen", "source": "https://infosec.exchange/users/zeljkazorz/statuses/113876974535447292", "content": "", "creation_timestamp": "2025-01-23T09:32:14.031936Z"}, {"uuid": "22aaf099-0ac2-484c-bbd4-94a26338a6dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgfmezephq23", "content": "", "creation_timestamp": "2025-01-23T09:53:45.384331Z"}, {"uuid": "bd1b12b7-e0a3-47cc-8f68-6a7dbb94e7da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/seanchiggins.com/post/3lgxxsgbo3x2x", "content": "", "creation_timestamp": "2025-01-30T17:06:02.504135Z"}, {"uuid": "9f570c42-9f31-4363-a75c-e1964501d3dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113877481441226300", "content": "", "creation_timestamp": "2025-01-23T11:41:08.984659Z"}, {"uuid": "f7a899fe-b7d3-4bf2-a790-ca4ad6fb8690", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgfsswxoor2t", "content": "", "creation_timestamp": "2025-01-23T11:48:55.700255Z"}, {"uuid": "30b38587-86a8-4379-a128-009892430dbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lgftnchvi227", "content": "", "creation_timestamp": "2025-01-23T12:03:39.703855Z"}, {"uuid": "4e98b490-2756-417f-bdbb-bdeeab88673c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgfudzppgz2e", "content": "", "creation_timestamp": "2025-01-23T12:16:22.246625Z"}, {"uuid": "de45fd6e-1d60-4966-a6ff-4e43f44c5896", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lgtazh7fss26", "content": "", "creation_timestamp": "2025-01-28T20:07:45.788149Z"}, {"uuid": "7584275b-60fc-47ef-b809-8d22d5d1e3c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgfvnyecms2i", "content": "", "creation_timestamp": "2025-01-23T12:39:51.071379Z"}, {"uuid": "a0665324-afcc-4b29-87dd-3e5430345665", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113877620549384238", "content": "", "creation_timestamp": "2025-01-23T12:16:31.731269Z"}, {"uuid": "af7ce3d5-e2ef-401c-a6d2-0fc02f720de5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/shoebhakim.bsky.social/post/3lgfuw6qrqf2j", "content": "", "creation_timestamp": "2025-01-23T12:26:31.175904Z"}, {"uuid": "c4afb0f0-34b2-4959-ad32-a185c0b13ccb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lgru5jxbok2n", "content": "", "creation_timestamp": "2025-01-28T06:44:42.134904Z"}, {"uuid": "6d58b820-c0a2-4839-9215-639205814e18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://thehackernews.com/2025/01/sonicwall-urges-immediate-patch-for.html", "content": "", "creation_timestamp": "2025-01-23T09:24:00.000000Z"}, {"uuid": "de8bf8f2-61c4-4181-aef8-e98b1e151ab3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lgfvu7iu6c27", "content": "", "creation_timestamp": "2025-01-23T12:43:21.867808Z"}, {"uuid": "55226323-7ffc-41fc-bd02-fb1db6c6cf85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/techit.bsky.social/post/3lgfws6jwoh26", "content": "", "creation_timestamp": "2025-01-23T13:00:04.523873Z"}, {"uuid": "e2b758e9-5028-4363-bba8-089e52187dd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://infosec.exchange/users/jbhall56/statuses/113877987479986882", "content": "", "creation_timestamp": "2025-01-23T13:49:50.155891Z"}, {"uuid": "0cb34c55-02d1-4fe4-bfba-7420a13b3d16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/jbhall56.bsky.social/post/3lgfzldznks2w", "content": "", "creation_timestamp": "2025-01-23T13:49:57.374414Z"}, {"uuid": "c5166717-cb70-462b-96c4-dbbd73eab85e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/hackread.bsky.social/post/3lgpszy4c2k2l", "content": "", "creation_timestamp": "2025-01-27T11:19:29.610442Z"}, {"uuid": "c0b299bb-7d55-4ffd-93cc-4a786f052915", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/Zero-Trust.activitypub.awakari.com.ap.brid.gy/post/3lgg2q4x4jcq2", "content": "", "creation_timestamp": "2025-01-23T14:10:43.307610Z"}, {"uuid": "4e554cc6-c707-49d4-8f84-99011e0ed821", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://threatintel.cc/2025/01/23/sonicwall-urges-immediate-patch-for.html", "content": "", "creation_timestamp": "2025-01-24T02:07:30.000000Z"}, {"uuid": "be108291-e256-4f6c-8333-8e56cda12a6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/cwealthsentinel.bsky.social/post/3lgg35leez22k", "content": "", "creation_timestamp": "2025-01-23T14:18:02.969864Z"}, {"uuid": "99568200-e99c-4fc9-8bee-f75bebb8f20d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lgpyv62ys32l", "content": "", "creation_timestamp": "2025-01-27T13:04:09.515777Z"}, {"uuid": "ba29a6d3-6576-4ea6-b20c-9082433c0a3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-7a8db539-390ee3a5c3f87ace", "content": "", "creation_timestamp": "2025-01-23T14:18:25.540167Z"}, {"uuid": "190ad34f-25bb-435c-b0d3-8a7c8212eb2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/taggart-tech.com/post/3lgg4wb55f22g", "content": "", "creation_timestamp": "2025-01-23T14:49:44.395981Z"}, {"uuid": "7f6b0115-fa6d-49e9-9c1d-c928e5b26fa5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/heinen.bsky.social/post/3lgg7tvgnfc2i", "content": "", "creation_timestamp": "2025-01-23T15:42:05.983018Z"}, {"uuid": "5463d327-ae7d-4392-b258-04e949d9bef6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lglsnpsv662x", "content": "", "creation_timestamp": "2025-01-25T21:02:00.007557Z"}, {"uuid": "9ebac69c-88c8-419e-b4db-f724999b67c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/opsmatters.bsky.social/post/3lglzyjng4i2o", "content": "", "creation_timestamp": "2025-01-25T23:13:17.251376Z"}, {"uuid": "86cb67e7-8810-46c3-9436-220a8ce23ab1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113878454592694966", "content": "", "creation_timestamp": "2025-01-23T15:48:51.201050Z"}, {"uuid": "489c4f4a-aef6-4aa5-8687-02d8275b5b8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/bluecyber.bsky.social/post/3lgg74nlwuk25", "content": "", "creation_timestamp": "2025-01-23T15:29:06.778766Z"}, {"uuid": "2c5aa01f-6725-45ff-baff-251239ca2c08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lgmbw2l3f22a", "content": "", "creation_timestamp": "2025-01-26T01:35:06.013391Z"}, {"uuid": "9667dd58-e5a3-41a4-976d-6593165c401b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/cwealthsentinel.bsky.social/post/3lh4pdvenau2c", "content": "", "creation_timestamp": "2025-02-01T14:18:04.392198Z"}, {"uuid": "ca09421a-cdbe-435d-80bb-b1a44b83688f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/jimguckin.bsky.social/post/3lggadnf67s2i", "content": "", "creation_timestamp": "2025-01-23T15:50:54.221752Z"}, {"uuid": "794455dd-04c8-4b1b-8327-6fba2356516d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113884066811725718", "content": "", "creation_timestamp": "2025-01-24T15:35:53.847162Z"}, {"uuid": "f63a0f1e-9e64-4e12-ad87-03590079bea1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://infosec.exchange/users/jbhall56/statuses/113906105247994046", "content": "", "creation_timestamp": "2025-01-28T13:00:33.288343Z"}, {"uuid": "ddabfa78-3ac5-4bed-8a65-2dc6e7bc14bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23007", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lh5kuj5ies2x", "content": "", "creation_timestamp": "2025-02-01T22:30:32.793162Z"}, {"uuid": "b1b4740f-d94e-47ac-8ba1-875ecee50bba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23007", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113916663254527555", "content": "", "creation_timestamp": "2025-01-30T09:45:35.808685Z"}, {"uuid": "65f25219-776e-4b2b-98d8-e0d998fc95f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3lgofbz5b2t23", "content": "", "creation_timestamp": "2025-01-26T21:40:46.164408Z"}, {"uuid": "b210b8b4-f79a-4680-8ea8-5c4eca7944f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/jbhall56.bsky.social/post/3lgsj5unaqk25", "content": "", "creation_timestamp": "2025-01-28T13:00:42.967634Z"}, {"uuid": "ede2379d-8f15-4398-8e05-302158b33180", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23001", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lh2isvrukf2n", "content": "", "creation_timestamp": "2025-01-31T17:15:50.930141Z"}, {"uuid": "26816fb4-1d42-4c18-8bbd-4227059389e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23007", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgxert2u6g2i", "content": "", "creation_timestamp": "2025-01-30T11:25:40.611062Z"}, {"uuid": "91fb457d-4ed8-4f88-a1e8-be07a1adb3f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/3185426", "content": "", "creation_timestamp": "2025-01-24T18:46:13.691899Z"}, {"uuid": "c825f28f-c579-4d10-afbf-288727aa0861", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lgozaetfac26", "content": "", "creation_timestamp": "2025-01-27T03:37:46.846122Z"}, {"uuid": "0747e220-3ed9-4b5f-9145-b4eea9ad80b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/campuscodi.risky.biz/post/3lggh5luigk2k", "content": "", "creation_timestamp": "2025-01-23T17:52:46.633042Z"}, {"uuid": "d31ceaf7-4636-4965-b30e-07f5cf7b66a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3lggqfnvwaf2u", "content": "", "creation_timestamp": "2025-01-23T20:38:23.016259Z"}, {"uuid": "a88da43d-9f38-4d7e-b2bd-a869399562b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3lgglio55lc2j", "content": "", "creation_timestamp": "2025-01-23T19:10:35.291990Z"}, {"uuid": "487dcd25-aaae-4d50-ad33-a111009c0557", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23007", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113917518881444652", "content": "", "creation_timestamp": "2025-01-30T13:23:12.116285Z"}, {"uuid": "83e2843e-0350-4d5d-9ca2-88336cac296a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/ninjaowl.ai/post/3lggmgtbw2l2j", "content": "", "creation_timestamp": "2025-01-23T19:27:25.831829Z"}, {"uuid": "91710d4c-3b24-4624-a666-c96e501936e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://threatintel.cc/2025/01/28/sonicwalls-zeroday-provokes-patch-alerts.html", "content": "", "creation_timestamp": "2025-01-28T11:29:40.000000Z"}, {"uuid": "b3daaf8e-a487-4768-8199-30a87f5a7f06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-01-24T21:10:02.000000Z"}, {"uuid": "fe14dcf2-4c53-4163-840e-9389bfe383eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23001", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lh2xd7ng5y2q", "content": "", "creation_timestamp": "2025-01-31T21:35:34.228095Z"}, {"uuid": "e18409dd-e7dc-4f45-905b-85f47f74a60d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lggqpt2f2p2j", "content": "", "creation_timestamp": "2025-01-23T20:44:04.347600Z"}, {"uuid": "c0dd564e-e601-4c74-81c5-1eb6b46e7c1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/mrbyte.bsky.social/post/3lggs2l3dxs2o", "content": "", "creation_timestamp": "2025-01-23T21:08:02.847905Z"}, {"uuid": "6a029c55-8fae-4808-880a-0360da495432", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23009", "type": "seen", "source": "https://bsky.app/profile/netspi.bsky.social/post/3lqcsuaguwk27", "content": "", "creation_timestamp": "2025-05-29T13:23:39.652359Z"}, {"uuid": "23ac7a07-c76c-41f6-9aab-bb65af5c2cda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23008", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmihwcmfmu2i", "content": "", "creation_timestamp": "2025-04-10T21:43:06.402389Z"}, {"uuid": "38d19f8a-e68e-4c06-9dc8-860856986601", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23009", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmihwd22jh2b", "content": "", "creation_timestamp": "2025-04-10T21:43:08.580506Z"}, {"uuid": "fab1f55c-9c80-409d-a2b1-4e1b37bcba9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23008", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmj3bm547k2p", "content": "", "creation_timestamp": "2025-04-11T03:29:27.067199Z"}, {"uuid": "89391f8a-2e45-4ea9-b327-69f03cb57b61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23008", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmj3rzyvhs2p", "content": "", "creation_timestamp": "2025-04-11T03:38:42.568813Z"}, {"uuid": "4d529c13-26cc-4b0a-9d3c-3ba90c6ce24b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23009", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lmjmo6372c2g", "content": "", "creation_timestamp": "2025-04-11T08:40:41.230687Z"}, {"uuid": "f734608d-9525-4ed4-89ae-c1722ce054a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-c465dbc4-89f3589511bbf4fb", "content": "", "creation_timestamp": "2025-02-11T15:06:58.203068Z"}, {"uuid": "d9b340da-c236-43e1-bb05-8bd9a19d6411", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:11:04.000000Z"}, {"uuid": "462d3d17-d628-4dae-bd45-b786f66bfe2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23008", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmp57ab6yk2q", "content": "", "creation_timestamp": "2025-04-13T13:19:54.966810Z"}, {"uuid": "f140ca4d-81bb-48d0-83a6-a81f16c91213", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23009", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lqc74qh4w22v", "content": "", "creation_timestamp": "2025-05-29T07:30:26.395034Z"}, {"uuid": "011a2d55-c152-444f-b2e5-f17c2e6a3771", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "MISP/d0bda5d9-8cbc-4c6c-8803-a5e3150f9ec2", "content": "", "creation_timestamp": "2025-09-01T19:03:03.000000Z"}, {"uuid": "0179e5ed-4bcb-461a-bcdb-95ee086ca0bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2300", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnf4gm3alt2y", "content": "", "creation_timestamp": "2025-04-22T07:04:41.090767Z"}, {"uuid": "67576208-5ab1-491f-b218-9feebd15716e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://www.cert.at/de/warnungen/2025/1/sonicwall-amc-cmc-rce", "content": "", "creation_timestamp": "2025-01-23T13:11:32.000000Z"}, {"uuid": "f7a784bb-e9f2-49a5-a221-7e348c9f97f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23008", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-08-09T17:25:37.000000Z"}, {"uuid": "0507f610-223d-493e-b64b-6792fbb2fba9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23008", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-09-10T07:00:37.000000Z"}, {"uuid": "152931c6-4487-457e-89cc-2900a946b67c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115735431932943323", "content": "", "creation_timestamp": "2025-12-17T14:42:23.831743Z"}, {"uuid": "72f76c42-66ee-472d-81ac-eca384139396", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/guardian360.bsky.social/post/3mafsnhzsro2m", "content": "", "creation_timestamp": "2025-12-20T08:40:54.157589Z"}, {"uuid": "cd67dee9-5146-4284-a543-1e65c0641413", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-51e3a85f-8592fbe159860167", "content": "", "creation_timestamp": "2025-12-18T08:50:35.746029Z"}, {"uuid": "68f61bb5-33c1-4ef2-925a-f23cb89903ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://www.acn.gov.it/portale/w/sonicwall-rilevato-sfruttamento-della-cve-2025-40602-in-catene-d-attacco", "content": "", "creation_timestamp": "2025-12-18T08:40:54.000000Z"}, {"uuid": "fea3ac04-d6fa-40f0-894b-b990cf394b07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-bd2e9802-1b74c0e6debd85f8", "content": "", "creation_timestamp": "2025-12-18T11:11:07.260647Z"}, {"uuid": "7874040e-5b43-4f07-b62b-ca9f092d526c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23001", "type": "seen", "source": "https://bsky.app/profile/alirezagharib.net/post/3maj2n336m22h", "content": "", "creation_timestamp": "2025-12-21T15:41:50.878172Z"}, {"uuid": "863b91a7-f01b-47b6-847a-93f87f5ab4ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23001", "type": "seen", "source": "https://bsky.app/profile/alirezagharib.net/post/3maj2n342wc2h", "content": "", "creation_timestamp": "2025-12-21T15:41:51.440240Z"}, {"uuid": "a6d61677-cc0a-49cc-a566-557e918bce01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3mai3iwgst22i", "content": "", "creation_timestamp": "2025-12-21T06:24:58.607380Z"}, {"uuid": "4985d1fb-77f6-4738-8b0e-3023184ffd77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23007", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3471", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23007\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-01-30T10:15:09.283\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0005", "creation_timestamp": "2025-01-30T11:18:56.000000Z"}, {"uuid": "1ecd96b5-8bab-4da6-ae16-58d2907db108", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2720", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23006\n\ud83d\udd39 Description: Pre-authentication deserialization of untrusted data vulnerability has been identified in the SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC), which in specific conditions could potentially enable a remote unauthenticated attacker to execute arbitrary OS commands.\n\ud83d\udccf Published: 2025-01-23T11:37:41.148Z\n\ud83d\udccf Modified: 2025-01-23T11:37:41.148Z\n\ud83d\udd17 References:\n1. https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0002", "creation_timestamp": "2025-01-23T12:03:30.000000Z"}, {"uuid": "3e6602c7-a4f1-4b66-9a5b-5c4d6f534ace", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1466", "content": "", "creation_timestamp": "2025-01-24T04:00:00.000000Z"}, {"uuid": "7dbbb04e-c308-4127-8951-de6c8abf2e56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2025-23006", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/c3177c82-2575-464a-90aa-e8884f2eceb9", "content": "", "creation_timestamp": "2026-02-02T12:26:15.932472Z"}, {"uuid": "54c47fb2-82b4-479a-9d10-dde6ef011558", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23007", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3483", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23007\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A vulnerability in the NetExtender Windows client log export function allows unauthorized access to sensitive Windows system files, potentially leading to privilege escalation.\n\ud83d\udccf Published: 2025-01-30T12:31:18Z\n\ud83d\udccf Modified: 2025-01-30T12:31:18Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-23007\n2. https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0005", "creation_timestamp": "2025-01-30T13:11:29.000000Z"}, {"uuid": "cac5ea1a-eda8-4277-ada4-7ded2b3ccece", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2300", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12804", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2300\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: Hitachi Ops Center Common Services within Hitachi Ops Center OVA contains an information exposure vulnerability.\nThis issue affects Hitachi Ops Center Common Services: from 11.0.3-00 before 11.0.4-00.\n\ud83d\udccf Published: 2025-04-22T04:12:41.660Z\n\ud83d\udccf Modified: 2025-04-22T04:12:41.660Z\n\ud83d\udd17 References:\n1. https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2025-112/index.html", "creation_timestamp": "2025-04-22T05:03:18.000000Z"}, {"uuid": "1b32ed34-51bd-4518-b025-a9483eecbf46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23009", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12289", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23009\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A local privilege escalation vulnerability in SonicWall NetExtender Windows (32 and 64 bit) client which allows an attacker to trigger an arbitrary file deletion.\n\ud83d\udccf Published: 2025-04-10T18:55:52.641Z\n\ud83d\udccf Modified: 2025-04-17T15:57:11.699Z\n\ud83d\udd17 References:\n1. https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0006", "creation_timestamp": "2025-04-17T16:58:57.000000Z"}, {"uuid": "7484a5ac-0e8e-43da-8da0-4df6fad387bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23001", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4854", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23001\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A Host header injection vulnerability exists in CTFd 3.7.5, due to the application failing to properly validate or sanitize the Host header. An attacker can manipulate the Host header in HTTP requests, which may lead to phishing attacks, reset password, or cache poisoning. NOTE: the Supplier's position is that the end user is supposed to edit the NGINX configuration template to set server_name (with this setting, Host header injection cannot occur).\n\ud83d\udccf Published: 2025-01-31T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-21T05:04:18.696Z\n\ud83d\udd17 References:\n1. https://github.com/CTFd/CTFd\n2. https://codetoanbug.com/poc-cve-2025-23001-ctfd-english/\n3. https://blog.ctfd.io/ctfd-3-7-6/", "creation_timestamp": "2025-02-21T05:18:21.000000Z"}, {"uuid": "874c0186-74e6-4b21-aa73-b3d0db331654", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2300", "type": "seen", "source": "https://t.me/cvedetector/23482", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2300 - Hitachi Ops Center Common Services Information Exposure\", \n  \"Content\": \"CVE ID : CVE-2025-2300 \nPublished : April 22, 2025, 5:15 a.m. | 36\u00a0minutes ago \nDescription : Hitachi Ops Center Common Services within Hitachi Ops Center OVA contains an information exposure vulnerability.  \nThis issue affects Hitachi Ops Center Common Services: from 11.0.3-00 before 11.0.4-00. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-22T08:22:14.000000Z"}, {"uuid": "1bf276a4-283a-4af2-b168-e1e6ba3457db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://t.me/DarkWebInformer_News/116", "content": "\ud83d\udea8 News Alert!\n\nSource: The Hacker News\nTitle: SonicWall Urges Immediate Patch for Critical CVE-2025-23006 Flaw Amid Likely Exploitation\nLink: https://thehackernews.com/2025/01/sonicwall-urges-immediate-patch-for.html", "creation_timestamp": "2025-01-28T21:19:53.000000Z"}, {"uuid": "64889df9-9f8d-440e-a9f0-d16b6ffb920a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23007", "type": "seen", "source": "https://t.me/cvedetector/16748", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23007 - Citrix NetExtender Windows Unauthenticated System File Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-23007 \nPublished : Jan. 30, 2025, 10:15 a.m. | 37\u00a0minutes ago \nDescription : A vulnerability in the NetExtender Windows client log export function allows unauthorized access to sensitive Windows system files, potentially leading to privilege escalation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-30T12:35:30.000000Z"}, {"uuid": "56bfaa38-9a26-4c07-9538-e131eec0cc8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23009", "type": "seen", "source": "https://t.me/cvedetector/22686", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23009 - SonicWall NetExtender Windows Local File Deletion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-23009 \nPublished : April 10, 2025, 7:16 p.m. | 2\u00a0hours, 9\u00a0minutes ago \nDescription : A local privilege escalation vulnerability in SonicWall NetExtender Windows (32 and 64 bit) client which allows an attacker to trigger an arbitrary file deletion. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-10T23:43:23.000000Z"}, {"uuid": "f8cf78fc-9970-4f09-a866-e70d220df995", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23008", "type": "seen", "source": "https://t.me/cvedetector/22685", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23008 - SonicWall NetExtender Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-23008 \nPublished : April 10, 2025, 7:16 p.m. | 2\u00a0hours, 9\u00a0minutes ago \nDescription : An improper privilege management vulnerability in the SonicWall NetExtender Windows (32 and 64 bit) client allows a low privileged attacker to modify configurations. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-10T23:43:23.000000Z"}, {"uuid": "99c64c4d-f213-4045-820f-e70c9e5cb149", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23001", "type": "seen", "source": "https://t.me/cvedetector/16957", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23001 - CTFd Host Header Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-23001 \nPublished : Jan. 31, 2025, 5:15 p.m. | 46\u00a0minutes ago \nDescription : A Host Header Injection vulnerability exists in CTFd 3.7.5, due to the application failing to properly validate or sanitize the Host header. An attacker can manipulate the Host header in HTTP requests, which may lead to phishing attacks, reset password, or cache poisoning. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-31T19:34:14.000000Z"}, {"uuid": "8206d972-1207-4b25-a3d2-295ef8f5f2b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "exploited", "source": "https://t.me/MalaysiaHacktivistz/7490", "content": "SonicWall Urges Immediate Patch for Critical CVE-2025-23006 Flaw Amid Likely Exploitation \u2013 thehackernews.com\n\nThu, 23 Jan 2025 18:24:00", "creation_timestamp": "2025-01-23T13:04:03.000000Z"}, {"uuid": "d5eedfd0-521e-439d-8c9b-0f1c69e928f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://t.me/cvedetector/16179", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23006 - SMA1000 Appliance Deserialization Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-23006 \nPublished : Jan. 23, 2025, 12:15 p.m. | 45\u00a0minutes ago \nDescription : Pre-authentication deserialization of untrusted data vulnerability has been identified in the SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC), which in specific conditions could potentially enable a remote unauthenticated attacker to execute arbitrary OS commands. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-23T14:08:04.000000Z"}, {"uuid": "91ace19b-4422-4cee-9ba0-8b5a833884ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "exploited", "source": "https://t.me/cibsecurity/82244", "content": "\ud83d\udd8b\ufe0f SonicWall Urges Immediate Patch for Critical CVE-2025-23006 Flaw Amid Likely Exploitation \ud83d\udd8b\ufe0f\n\nSonicWall is alerting customers of a critical security flaw impacting its Secure Mobile Access SMA 1000 Series appliances that it said has been likely exploited in the wild as a zeroday. The vulnerability, tracked as CVE202523006, is rated 9.8 out of a maximum of 10.0 on the CVSS scoring system. \"Preauthentication deserialization of untrusted data vulnerability has been identified in the.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"The Hacker News\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2025-01-23T12:45:14.000000Z"}, {"uuid": "4eb5ba84-d453-4ed1-a57c-b1368f077c78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://t.me/TheDarkWebInformer/10673", "content": "\ud83d\udea8 News Alert!\n\nTitle: SonicWall Urges Immediate Patch for Critical CVE-2025-23006 Flaw Amid Likely Exploitation\nLink: https://thehackernews.com/2025/01/sonicwall-urges-immediate-patch-for.html", "creation_timestamp": "2025-01-23T12:34:16.000000Z"}, {"uuid": "9acb3454-8aa6-4264-8508-c1b64c169f92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "exploited", "source": "Telegram/BHbi8MqkgddymtdILJxNtlW9DbIAsWHFWiIJp5kZEdYa0nA", "content": "", "creation_timestamp": "2025-01-23T13:04:00.000000Z"}, {"uuid": "c9780048-0560-4d06-9aad-56e7d6c70920", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23001", "type": "seen", "source": "Telegram/9RUo2eWtkkr7hgDDooV-_XZHKahFxYDL2P697R_RThcGWIci", "content": "", "creation_timestamp": "2025-02-21T08:03:23.000000Z"}, {"uuid": "5587b122-72a6-4be5-ae25-c1a1104dfcbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "exploited", "source": "https://t.me/MalaysiaHacktivistz/1430", "content": "SonicWall Urges Immediate Patch for Critical CVE-2025-23006 Flaw Amid Likely Exploitation \u2013 thehackernews.com\n\nThu, 23 Jan 2025 18:24:00", "creation_timestamp": "2025-01-23T13:04:03.000000Z"}, {"uuid": "e1a67643-e3bc-46e7-8ec6-af1622458717", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "exploited", "source": "https://t.me/ctinow/229842", "content": "SonicWall warns of a critical CVE-2025-23006 zero-day likely exploited in the wild\nhttps://ift.tt/6umA0xf", "creation_timestamp": "2025-01-24T10:49:44.000000Z"}, {"uuid": "dfdf0a2a-1d4d-43b4-8453-8f6ea7f4bed7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://t.me/true_secator/6670", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u044e\u0442 \u043e \u0434\u0432\u0443\u0445 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u044f\u0445, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0445 \u0441 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0435\u0439 \u0443\u0437\u044f\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 SimpleHelp Remote Monitoring and Management (RMM) \u0438 SonicWall Secure Mobile Access (SMA) 1000.\n\n\u041f\u0435\u0440\u0432\u0430\u044f \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043d\u0435\u0434\u0430\u0432\u043d\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f SimpleHelp RMM \u0434\u043b\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u043f\u0435\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0446\u0435\u043b\u0435\u0432\u044b\u043c \u0441\u0435\u0442\u044f\u043c.\n\nCVE-2024-57726, CVE-2024-57727 \u0438 CVE-2024-57728 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0442\u044c \u0438 \u0432\u044b\u0433\u0440\u0443\u0436\u0430\u0442\u044c \u0444\u0430\u0439\u043b\u044b \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u0438 \u043f\u043e\u0432\u044b\u0448\u0430\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0434\u043e \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u043e\u0433\u043e \u0443\u0440\u043e\u0432\u043d\u044f.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0438\u00a0\u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044b \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 Horizon3\u00a0\u0434\u0432\u0435 \u043d\u0435\u0434\u0435\u043b\u0438 \u043d\u0430\u0437\u0430\u0434. SimpleHelp \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043c\u0435\u0436\u0434\u0443 8 \u0438 13 \u044f\u043d\u0432\u0430\u0440\u044f \u0432 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430 5.5.8, 5.4.10 \u0438 5.3.9.\n\n\u0412\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0430\u044f \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u0437\u0430\u043c\u0435\u0447\u0435\u043d\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 Arctic Wolf \u0438 \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u0430 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u044b SimpleHelp \u043f\u0440\u0438\u043c\u0435\u0440\u043d\u043e \u0447\u0435\u0440\u0435\u0437 \u043d\u0435\u0434\u0435\u043b\u044e \u043f\u043e\u0441\u043b\u0435 \u0442\u043e\u0433\u043e, \u043a\u0430\u043a Horizon3 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e \u0440\u0430\u0441\u043a\u0440\u044b\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043f\u043e\u043a\u0430 \u0442\u043e\u0447\u043d\u043e \u043d\u0435 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0438\u043b\u0438, \u0447\u0442\u043e \u0430\u0442\u0430\u043a\u0438 \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0442 \u0438\u043c\u0435\u043d\u043d\u043e \u044d\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043d\u043e \u0441\u0432\u044f\u0437\u044b\u0432\u0430\u0435\u0442 \u0441\u0432\u043e\u0438 \u043d\u0430\u0431\u043b\u044e\u0434\u0435\u043d\u0438\u044f \u0441 \u043e\u0442\u0447\u0435\u0442\u043e\u043c Horizon3 \u0441\u043e \u0441\u0440\u0435\u0434\u043d\u0435\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u044c\u044e \u0443\u0432\u0435\u0440\u0435\u043d\u043d\u043e\u0441\u0442\u0438.\n\n\u0422\u0435\u043c \u043d\u0435 \u043c\u0435\u043d\u0435\u0435, Arctic Wolf \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u0434\u043e \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0445 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0432\u0435\u0440\u0441\u0438\u0439 \u0441\u0435\u0440\u0432\u0435\u0440\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f SimpleHelp, \u0433\u0434\u0435 \u044d\u0442\u043e \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e.\n\n\u0412 \u0441\u0438\u0442\u0443\u0430\u0446\u0438\u044f\u0445, \u043a\u043e\u0433\u0434\u0430 \u043a\u043b\u0438\u0435\u043d\u0442 SimpleHelp \u0431\u044b\u043b \u0440\u0430\u043d\u0435\u0435 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 \u0434\u043b\u044f \u0441\u0435\u0430\u043d\u0441\u043e\u0432 \u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0435\u0439 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0438, \u043d\u043e \u043d\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0432 \u043f\u043e\u0432\u0441\u0435\u0434\u043d\u0435\u0432\u043d\u043e\u0439 \u0440\u0430\u0431\u043e\u0442\u0435, Arctic Wolf \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u0443\u0434\u0430\u043b\u0438\u0442\u044c \u041f\u041e, \u0447\u0442\u043e\u0431\u044b \u0443\u043c\u0435\u043d\u044c\u0448\u0438\u0442\u044c \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u0443\u044e \u043f\u043e\u0432\u0435\u0440\u0445\u043d\u043e\u0441\u0442\u044c \u0430\u0442\u0430\u043a\u0438.\n\n\u0412 \u0441\u0432\u043e\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c, Shadowserver Foundation \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0430, \u0447\u0442\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0430 \u0432 \u0441\u0435\u0442\u0438 580 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u044d\u043a\u0437\u0435\u043c\u043f\u043b\u044f\u0440\u043e\u0432, \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 (345) - \u0432 \u0421\u0428\u0410.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f SonicWall \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0434\u0438\u043b\u0430, \u0447\u0442\u043e 0-day \u0432 SMA 1000, \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u0430\u044f \u043a\u0430\u043a CVE-2025-23006, \u0431\u044b\u043b\u0430 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0430 \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0430\u00a0\u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044c \u0438 \u043f\u0440\u043e\u0438\u043d\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043b\u0430, \u0447\u0442\u043e \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Appliance Management Console (AMC) \u0438 Central Management Console (CMC) \u0448\u043b\u044e\u0437\u0430 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0435 \u043d\u0435\u043d\u0430\u0434\u0435\u0436\u043d\u043e\u0439 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0434\u0430\u043d\u043d\u044b\u0445, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438.\n\nCVE-2025-23006 \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u0432 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 SMA1000 \u0441 \u0432\u044b\u043f\u0443\u0441\u043a\u043e\u043c \u0432\u0435\u0440\u0441\u0438\u0438 12.4.3-02854 \u0438 \u0438\u0437\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 Microsoft.\n\n\u0422\u043e\u0433\u0434\u0430 SonicWall \u0432\u00a0\u0441\u0440\u043e\u0447\u043d\u043e\u043c \u0443\u0432\u0435\u0434\u043e\u043c\u043b\u0435\u043d\u0438\u0438 \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0434\u0438\u043b\u0430 \u0444\u0430\u043a\u0442 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445, \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u043e\u0432\u0430\u0432 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0438.\n\n\u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438, \u0438\u043c\u0435\u044e\u0449\u0438\u0435 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0435\u043c\u0443 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0443 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 (\u043a\u0430\u043a \u0432 \u043e\u0434\u043d\u043e-, \u0442\u0430\u043a \u0438 \u0432 \u0434\u0432\u0443\u0445\u0434\u043e\u043c\u0435\u043d\u043d\u043e\u0439 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0430), \u043c\u043e\u0433\u0443\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c CVE-2025-23006 \u0434\u043b\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430\n\nShodan \u0438 Censys \u043f\u043e\u043a\u0430\u0437\u044b\u0432\u0430\u044e\u0442 \u043e\u043a\u043e\u043b\u043e 2000 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 SMA, \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u0447\u0435\u0440\u0435\u0437 \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442, \u0430 Netlas - \u043e\u043a\u043e\u043b\u043e 4000, \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043d\u0430\u0445\u043e\u0434\u044f\u0442\u0441\u044f \u0432 \u0421\u0428\u0410.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043f\u0438\u0448\u0443\u0442, \u0447\u0442\u043e \u0442\u043e\u043b\u044c\u043a\u043e 215 \u0438\u0437 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0445 \u043d\u0430 Shodan \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432, \u043f\u043e-\u0432\u0438\u0434\u0438\u043c\u043e\u043c\u0443, \u0440\u0430\u0441\u043a\u0440\u044b\u0432\u0430\u044e\u0442 \u0441\u0432\u043e\u0439 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2025-23006.\n\n\u041d\u043e \u0431\u0443\u0434\u0435\u043c \u043f\u043e\u0441\u043c\u043e\u0442\u0440\u0435\u0442\u044c. \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u0447\u0430\u0441\u0442\u043e \u043d\u0430\u0446\u0435\u043b\u0438\u0432\u0430\u044e\u0442\u0441\u044f \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b SonicWall \u0438 \u0432\u0440\u044f\u0434 \u043b\u0438 \u0443\u043f\u0443\u0441\u0442\u044f\u0442 \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u0443\u044e \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c.", "creation_timestamp": "2025-01-29T13:50:05.000000Z"}, {"uuid": "9ae40456-4181-4eed-a2e1-0c87646087de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23009", "type": "seen", "source": "https://t.me/CyberBulletin/3363", "content": "\u26a1\ufe0fCVE-2025-23009 &amp; CVE-2025-23010: Elevating Privileges with SonicWall NetExtender.\n\n#CyberBulletin", "creation_timestamp": "2025-05-29T09:00:07.000000Z"}, {"uuid": "f85a4757-4ba3-4117-84f3-b7598958da27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "exploited", "source": "Telegram/u-gW1eb8QqI1fW_s8oFamgC8dIBNrGj8nj1hkaP1pMtnRi0", "content": "", "creation_timestamp": "2025-01-25T07:30:33.000000Z"}, {"uuid": "163493f9-98e4-4a56-b67f-a9a11da015e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "seen", "source": "https://t.me/ctinow/229778", "content": "SonicWall Urges Immediate Patch for Critical CVE-2025-23006 Flaw Amid Likely Exploitation\nhttps://ift.tt/WhdbJX7", "creation_timestamp": "2025-01-23T12:44:20.000000Z"}, {"uuid": "b3656bc1-5807-4512-9d50-e348f54592da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23006", "type": "exploited", "source": "https://t.me/information_security_channel/53010", "content": "SonicWall Confirms Exploitation of New SMA Zero-Day\nhttps://www.securityweek.com/sonicwall-confirms-exploitation-of-new-sma-zero-day/\n\nSonicWall has confirmed that an SMA 1000 zero-day tracked as CVE-2025-23006 has been exploited in the wild.\nThe post SonicWall Confirms Exploitation of New SMA Zero-Day (https://www.securityweek.com/sonicwall-confirms-exploitation-of-new-sma-zero-day/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2025-01-28T15:24:40.000000Z"}]}