Rapid7 at Pwn2Own: Raising the Bar in Vuln Intel
As the 2025 edition of Pwn2Own Ireland draws to a close, we are taking a beat to reflect on Rapid7βs participation & achievements in the world of competitive zero day exploit development.
As Pwn2Own Ireland 2025 draws to a close, a huge thank you to @thezdi.bsky.social for putting on another great contest! I reflected on why @rapid7.com has taken part at #Pwn2Own over the last two years, and our successes so far in the world of competitive zero day exploit development r-7.co/4o6RM85
24.10.2025 16:51 β π 1 π 2 π¬ 0 π 0
The auth bypass appears to be a patch bypass of an older 2018 vuln (CVE-2018-0296). The buffer overflow is in a Lua endpoint, but unsafe native code operations allow a buffer to be overflowed and memory corruption to occur.
06.10.2025 08:39 β π 0 π 0 π¬ 0 π 0
CVE-2025-20362 | AttackerKB
On September 25, 2025, Cisco published advisories for two new vulnerabilities, CVE-2025-20362, and CVE-2025-20333, which are known to be exploited in-the-wild β¦
We just posted our AttackerKB @rapid7.com Analysis for the recent Cisco 0day chain; CVE-2025-20362 and CVE-2025-20333. Full technical root cause analysis of both the auth bypass and buffer overflow are here: attackerkb.com/topics/Szq5u...
06.10.2025 08:38 β π 2 π 1 π¬ 1 π 0
and shout out to @iagox86.bsky.social who figured out the access control bypass part of this back in his 2023 analysis of the CVE-2023-0069 patch π₯
24.09.2025 13:35 β π 3 π 1 π¬ 1 π 0
CVE-2025-10035 | AttackerKB
On September 18, 2025, Fortra published a security advisory for a new vulnerability affecting their managed file transfer product, GoAnywhere MFT. The new vulnβ¦
We have published our AttackerKB @rapid7.com Analysis for the recent GoAnywhere MFT vuln, CVE-2025-10035. It's an access control bypass + unsafe deserialization + an as-yet unknown issue in how an attacker can know a specific private key! attackerkb.com/topics/LbA9A...
24.09.2025 13:33 β π 5 π 2 π¬ 1 π 0
β οΈ Rapid7 has identified a permission bypass vuln. in multiple versions of #OnePlus OxygenOS installed on its Android smartphones.
When leveraged, any app on the device may read SMS/MMS data & metadata via the default Telephony provider. More in our blog: r-7.co/42EujlR
23.09.2025 12:58 β π 1 π 1 π¬ 0 π 0
Senior Security Researcher - United Kingdom
The Senior Security Researcher will drive vulnerability discovery and analysis within Rapid7βs Vulnerability Intelligence team. Youβll research zero-day and n-day threats, develop exploits, publish ro...
Come join @rapid7.com ! Iβm hiring for a Senior Security Researcher to join our team. You'll get to work on n-day analysis, zero-day research, exploit development, and more - focusing on enterprise software and appliances. Fully remote in the UK, more details here: careers.rapid7.com/jobs/senior-...
25.08.2025 16:57 β π 3 π 0 π¬ 0 π 0
I just completed the reimplementation of the in-the-wild gadget to use the Msf::Util::DotNetDeserialization routines, so that part is much cleaner now, no more sketchy blobs of base64 π
23.07.2025 17:06 β π 1 π 0 π¬ 0 π 0
We now have a (draft) @metasploit-r7.bsky.social exploit module in the pull queue for the recent Microsoft SharePoint Server unauthenticated RCE zero-day (CVE-2025-53770), based on the in-the-wild exploit published a few days ago. Check it out here: github.com/rapid7/metas...
23.07.2025 13:18 β π 11 π 8 π¬ 1 π 0
Our @metasploit-r7.bsky.social auxiliary module for the new Brother auth bypass is available. The module will leak a serial number via HTTP/HTTPS/IPP (CVE-2024-51977), SNMP, or PJL, generate the devices default admin password (CVE-2024-51978), and then validate the creds: github.com/rapid7/metas...
25.06.2025 08:54 β π 5 π 1 π¬ 0 π 0
Rapid7
Rapid7Β conducted a zero-day research project into multifunction printers (MFP) fromΒ Brother Industries, Ltd. This research resulted in the discovery ofΒ 8 new vulnerabilities.
Today @rapid7.com is disclosing 8 new vulnerabilities affecting 742 models across 4 vendors. After 13 months of coordinated disclosure with Brother Industries, Ltd, we're detailing all issues including a critical auth bypass. Full details here: www.rapid7.com/blog/post/mu...
25.06.2025 08:44 β π 3 π 2 π¬ 0 π 1
Today @rapid7.com disclosed two vulns affecting NetScaler Console and SDX, found by Senior Security Researcher Calum Hutton! π Our blog details the authenticated arbitrary file read vuln (CVE-2025-4365), and the authenticated arbitrary file write vuln (Which the vendor has not assigned a CVE for).
18.06.2025 20:02 β π 3 π 2 π¬ 0 π 0
CVE-2024-58136 | AttackerKB
Yii framework is a component-based MVC web application framework, providing developers with the building blocks to create complex web applications including moβ¦
A new @rapid7.com Analysis of CVE-2024-58136 was just published to AttackerKB, courtesy of Calum Hutton π₯ Affecting the Yii framework, this analysis details the root cause of CVE-2024-58136, and how it can be leveraged for RCE via a dirty file write to a log file. attackerkb.com/topics/U2Ddo...
27.05.2025 10:38 β π 2 π 0 π¬ 0 π 0
GitHub - sfewer-r7/CVE-2025-22457
Contribute to sfewer-r7/CVE-2025-22457 development by creating an account on GitHub.
This was an interesting challenge to go from a restricted character set "0123456789." for the overflow, to arbitrary RCE. Hat tip to watchTowr for diffing out the bug last Friday. PoC available here: github.com/sfewer-r7/CV...
10.04.2025 18:20 β π 1 π 0 π¬ 0 π 0
CVE-2025-22457 | AttackerKB
On April 3, 2025, Ivanti published an advisory for CVE-2025-22457, an unauthenticated remote code execution vulnerability due to a stack based buffer overflow.β¦
We have just published our AttackerKB @rapid7.com Analysis of CVE-2025-22457, an unauthenticated stack based buffer overflow in Ivanti Connect Secure. Difficult to exploit due to severe character restrictions, we detail our full RCE technique here: attackerkb.com/topics/0ybGQ...
10.04.2025 18:19 β π 3 π 4 π¬ 1 π 0
A VM escape exploit chain, exploited in the wild as 0day ...well that's not something we see very often π
07.03.2025 09:12 β π 11 π 4 π¬ 0 π 0
We are also publishing our AttackerKB Rapid7 analysis for CVE-2024-12356 - Unauth RCE affecting BeyondTrust PRA & RS, which was exploited in the wild last Dec as 0day ...our analysis details leveraging the new PostgreSQL vuln CVE-2025-1094 for RCE! π attackerkb.com/topics/G5s8Z...
13.02.2025 16:05 β π 1 π 2 π¬ 1 π 0
CVE-2025-1094: PostgreSQL psql SQL injection (FIXED) | Rapid7 Blog
Today Rapid7 has disclosed CVE-2025-1094, a new PostgreSQL SQLi vuln we discovered while researching CVE-2024-12356 in BeyondTrust Remote Support. Untrusted inputs that have been safely character escaped could still generate SQLi under certain conditions: www.rapid7.com/blog/post/20...
13.02.2025 16:05 β π 2 π 4 π¬ 1 π 0
GreyNoise Labs - How-To: Linux Process Injection
Ever wondered how to inject code into a process on Linux?
Process injection shenanigans are dear to my heart - it's one of the first things I ever learned in security.
Inspired by an Akamai blog last month, this blog digs into techniques to tinker with other processes on Linux, and show you how to write a little debugger in C!
28.01.2025 17:28 β π 4 π 1 π¬ 0 π 0
100% this!! They're amazing π
23.01.2025 07:52 β π 2 π 0 π¬ 1 π 0
Without a suitable info leak you have to brute force the 32bit base address of a shared library, and with 9 bits of entropy this can take upwards of 1.5 hours, although in practice it can be much quicker. Regardless of the time it takes to succeed, exploitation is reliable.
16.01.2025 15:52 β π 2 π 0 π¬ 1 π 0
I wrote a PoC for the recent Ivanti Connect Secure stack buffer overflow, CVE-2025-0282, based on the exploitation strategy watchTowr published, along with an assessment of exploitability given the lack of a suitable info leak to break ASLR: attackerkb.com/assessments/...
16.01.2025 15:52 β π 11 π 8 π¬ 1 π 0
We now have a @metasploit-r7.bsky.social RCE exploit module in the pull queue for CVE-2024-55956 - an unauthenticated file write vulnerability affecting Cleo LexiCom, VLTrader, and Harmony which was exploited in the wild last month as 0day: github.com/rapid7/metas...
07.01.2025 20:55 β π 2 π 1 π¬ 0 π 0
Last month, our Security Research team discovered and disclosed a critical pre-authentication RCE in CraftCMS (CVE-2024-56145). You can read our blog post on the issue here: assetnote.io/resources/re...
#attacksurfacemanagement
19.12.2024 02:12 β π 9 π 5 π¬ 0 π 0
Riding around in the breeze. Security Thinker. Hacker. USAF Veteran. https://aff-wg.org
C++ developer specializing in source and binary program analysis and transformation.
OS/systems engineer, co-founder of Augmend. I used to work on WinDbg at Microsoft. Also on mastodon/fediverse as @tim@dbg.social
Program Analysis / Reverse Engineering
Chief Scientist @ BINARLY
Website: https://xv.ax
and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...
Hacker. Friend. Cybersecurity Researcher at Huntress.
πΊπΈ Waging algorithmic warfare since 2003. Software & Security Engineer. Non-Resident Research Fellow CSETGeorgetown CyberAI
Programmer, #malware analyst. Author of #PEbear, #PEsieve, #TinyTracer. Private account. All opinions expressed here are mine only (not of my employer etc) ; https://hasherezade.net
Experienced InfoSec | Elder Millennial | πΌ @GreyNoiseIO | I ask 'why?' a lot | Pro Oxford Comma | Fix it! | He/Him | #BLM | Views are my own.
https://linktr.ee/glennthorpe
Official account of the Metasploit Project, part of the Rapid7 family.
Mastodon: @metasploit@infosec.exchange
Slack: http://metasploit.com/slack
Velociraptor@Rapid7. #DFIR, #CTI and research.
https://mgreen27.github.io
Rapid7 can help you command your attack surface, smash silos, stay steps ahead of attackers, and take breaches from βinevitableβ to preventable. Rapid7 technology, services, and research give organizations around the world control.
π: rapid7.com
Chief Scientist @Rapid7 (ex @McAfee) | @cloudsa | Co-author of @CyberGridBook & CSA Guide to Cloud | Advisor
@EC3Europol
https://bsky.app/profile/rajsamani.bsky.social
Principal Security Engineer at Microsoft. Formerly at Google and Amazon.
Everything is always broken. Googler by day. #BinDiff maintainer. My tweets, my opinion.
During my lifetime, CO2 increased by 67.84ppm (so far).
http://pronoun.is/he
"Vulnerability researcher" doing BB on free time (http://yeswehack.com/hunters/chackal) Also doing some Reverse on many targets but find no vuln π
Blogpost: https://medium.com/@chackal
VR team tech lead @synacktiv.com