#AuthenticationBypass
I just completed the Web Security Academy lab:

Authentication bypass via OAuth implicit flow

#AuthenticationBypass #WebAppSec #Cybersecurity

portswigger.net/web-security...
Lab: Authentication bypass via OAuth implicit flow | Web Security Academy
This lab uses an OAuth service to allow users to log in with their social media account. Flawed validation by the client application makes it possible for ...
portswigger.net
August 31, 2025 at 1:06 PM
High-severity vulnerability in Passwordstate credential manager. Patch now. https://arstechni.ca... #authenticationbypass #passwordmanagers #vulnerabilities #Security #patches #Biz&IT
August 28, 2025 at 8:02 PM
Diese BMCs zur Fernwartung sind ein ewiger Quell an gefährlichen Bugs. Z. B. gab es so einen Authenticationbypass schon einmal.
Man kann BMCs vom Server selbst und von außen angreifen.

Attacken auf Fernwartungsfirmware von Servern laufen | heise online

heise.de/-10461788
Attacken auf Fernwartungsfirmware von Servern laufen
Eine kritische Sicherheitslücke in der Fernwartungsfirmware AMI MegaRAC wird im Netz angegriffen, warnt die CISA.
heise.de
June 28, 2025 at 1:15 PM
Trend Micro Patches Critical Remote Code Execution and Authentication Bypass Flaws in Apex Central and PolicyServer #AuthenticationBypass #CVE #CVEexploits
Trend Micro Patches Critical Remote Code Execution and Authentication Bypass Flaws in Apex Central and PolicyServer
Trend Micro has rolled out essential security updates to address a series of high-impact vulnerabilities discovered in two of its enterprise security solutions: Apex Central and the Endpoint Encryption (TMEE) PolicyServer. These newly disclosed issues, which include critical remote code execution (RCE) and authentication bypass bugs, could allow attackers to compromise systems without needing login credentials.  Although there have been no confirmed cases of exploitation so far, Trend Micro strongly recommends immediate patching to mitigate any potential threats. The vulnerabilities are especially concerning for organizations operating in sensitive sectors, where data privacy and regulatory compliance are paramount.  The Endpoint Encryption PolicyServer is a key management solution used to centrally control full disk and media encryption across Windows-based systems. Following the recent update, four critical issues in this product were fixed. Among them is CVE-2025-49212, a remote code execution bug that stems from insecure deserialization within PolicyValue Table Serialization Binder class. This flaw enables threat actors to run code with SYSTEM-level privileges without any authentication.  Another serious issue, CVE-2025-49213, was found in the PolicyServerWindowsService class, also involving unsafe deserialization. This vulnerability similarly allows arbitrary code execution without requiring user credentials. An additional bug, CVE-2025-49216, enables attackers to bypass authentication entirely due to faulty logic in the DbAppDomain service. Lastly, CVE-2025-49217 presents another RCE risk, though slightly more complex to exploit, allowing code execution via the ValidateToken method.  While Trend Micro categorized all four as critical, third-party advisory firm ZDI classified CVE-2025-49217 as high-severity. Besides these, the latest PolicyServer release also fixes multiple other high-severity vulnerabilities, such as SQL injection and privilege escalation flaws. The update applies to version 6.0.0.4013 (Patch 1 Update 6), and all earlier versions are affected. Notably, there are no workarounds available, making the patch essential for risk mitigation.  Trend Micro also addressed separate issues in Apex Central, the company’s centralized console for managing its security tools. Two pre-authentication RCE vulnerabilities—CVE-2025-49219 and CVE-2025-49220—were identified and patched. Both flaws are caused by insecure deserialization and could allow attackers to execute code remotely as NETWORK SERVICE without authentication.  These Apex Central vulnerabilities were resolved in Patch B7007 for the 2019 on-premise version. Customers using Apex Central as a Service will receive fixes automatically on the backend.  Given the severity of these cybersecurity vulnerabilities, organizations using these Trend Micro products should prioritize updating their systems to maintain security and operational integrity.
dlvr.it
June 20, 2025 at 4:28 PM