Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Attackers exploiting this flaw could bypass authentication mechanisms and execute arbitrary code by sending maliciously crafted .NET remoting messages to vulnerable endpoints. Security researcher Sina Kheirkhah of watchTowr Labs, who is credited with discovering the flaw, noted, “Insecure deserialization remains a pervasive threat. Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. In this case, the Plugin_Host service deserializes messages without verifying their integrity, enabling attackers to inject malicious object payloads. As watchTowr’s research underscores, proactive defense, not just patching, is essential in an era when attackers rapidly weaponize such flaws. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications. Successful exploitation could grant attackers SYSTEM-level privileges, compromising entire clusters. Organizations opting for manual DR configuration must follow Veritas’ guidelines to avoid reactivating the endpoint.
This Cyber News was published on cybersecuritynews.com. Publication date: Tue, 11 Mar 2025 09:50:06 +0000