Skip to content
Merged
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
16 changes: 16 additions & 0 deletions src/content/docs/waf/change-log/2025-05-05.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,22 @@ tableOfContents: false

import { RuleID } from "~/components";

This week's analysis covers 5 CVEs with varying impact levels. Four are rated critical, while two are rated high severity. Remote Code Execution vulnerabilities dominate this set.

Key Findings
GFI KerioControl (CVE-2024-52875) contains an unauthenticated Remote Code Execution (RCE) vulnerability that targets firewall appliances. This vulnerability can let attackers gain root level system access, making this CVE particularly attractive for threat actors.

The SonicWall SMA vulnerabilities remain concerning due to their continued exploitation since 2021. These critical vulnerabilities in remote access solutions create dangerous entry points to networks.

Impact
Customers using the Managed Ruleset will receive rule coverage following this week's release. Below is a breakdown of the recommended prioritization based on current exploitation trends

GFI KerioControl (CVE-2024-52875) - Highest priority; unauthenticated RCE
SonicWall SMA (Multiple vulnerabilities) - Critical for network appliances
Groovy (CVE-2025-24893) - High priority for development environments
Langflow (CVE-2025-3248) - Important for AI workflow platforms
MinIO (CVE-2025-31489) - Important for object storage implementations

<table style="width: 100%">
<thead>
<tr>
Expand Down