Skip to content

Commit e58c18b

Browse files
fb1337pedrosousa
andauthored
[WAF] Add notes about the 2025-05-05 update (#22279)
--------- Co-authored-by: Pedro Sousa <[email protected]>
1 parent 929a6f1 commit e58c18b

File tree

1 file changed

+18
-0
lines changed

1 file changed

+18
-0
lines changed

src/content/docs/waf/change-log/2025-05-05.mdx

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,24 @@ tableOfContents: false
99

1010
import { RuleID } from "~/components";
1111

12+
This week's analysis covers five CVEs with varying impact levels. Four are rated critical, while one is rated high severity. Remote Code Execution vulnerabilities dominate this set.
13+
14+
**Key Findings**
15+
16+
GFI KerioControl (CVE-2024-52875) contains an unauthenticated Remote Code Execution (RCE) vulnerability that targets firewall appliances. This vulnerability can let attackers gain root level system access, making this CVE particularly attractive for threat actors.
17+
18+
The SonicWall SMA vulnerabilities remain concerning due to their continued exploitation since 2021. These critical vulnerabilities in remote access solutions create dangerous entry points to networks.
19+
20+
**Impact**
21+
22+
Customers using the Managed Ruleset will receive rule coverage following this week's release. Below is a breakdown of the recommended prioritization based on current exploitation trends:
23+
24+
- GFI KerioControl (CVE-2024-52875) - Highest priority; unauthenticated RCE
25+
- SonicWall SMA (Multiple vulnerabilities) - Critical for network appliances
26+
- XWiki (CVE-2025-24893) - High priority for development environments
27+
- Langflow (CVE-2025-3248) - Important for AI workflow platforms
28+
- MinIO (CVE-2025-31489) - Important for object storage implementations
29+
1230
<table style="width: 100%">
1331
<thead>
1432
<tr>

0 commit comments

Comments
 (0)