Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Fixing the Pupil Debt Disaster with U.S. Information CEO Eric Gertler

    March 3, 2026

    Reduce Doc AI Prices 90%

    March 3, 2026

    A Newbie’s Studying Checklist for Giant Language Fashions for 2026

    March 2, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»New ICS And IT Vulnerabilities Tracked By Cyble This Week
    AI Ethics & Regulation

    New ICS And IT Vulnerabilities Tracked By Cyble This Week

    Declan MurphyBy Declan MurphyDecember 16, 2025No Comments5 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    New ICS And IT Vulnerabilities Tracked By Cyble This Week
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    CRIL experiences this week’s IT vulnerabilities, highlighting zero-days, lively exploits, and trending threats throughout IT and industrial networks.

    Final week’s experiences from Cyble Analysis & Intelligence Labs (CRIL) to purchasers highlighted new flaws from December 03 via December 09, 2025, together with newly disclosed IT vulnerabilities, ICS vulnerabilities, lively exploitation makes an attempt, and dark-web discussions round weaponized CVEs. Drawing from CISA alerts, CRIL’s international sensor community, and Cyble’s vulnerability intelligence platform, the findings define speedy PoC launch cycles, persistent automated exploitation, and focused assaults in opposition to vital infrastructure. 

    CRIL’s threat-hunting infrastructure deployed throughout a number of areas continues to document real-time malicious exercise, together with exploit makes an attempt, brute-force intrusions, malware injections, and financially motivated assaults. There was a sustained rise in botnet-driven campaigns and opportunistic exploitation of internet-exposed and misconfigured industrial gadgets all through the reporting interval. 

    Extra broadly, CRIL’s weekly perception reveals a pointy enhance in newly disclosed vulnerabilities. The Vulnerability Intelligence (VI) module recognized 1,378 vulnerabilities this week, together with over 131 with publicly obtainable PoCs and three new zero-days.  

    The Week’s High IT Vulnerabilities 

    CRIL’s weekly vulnerability intelligence evaluation discovered a number of high-impact points affecting enterprise applied sciences, software program ecosystems, and internet-facing purposes. Main distributors reporting vital vulnerability counts included Linux distributions, Google, Microsoft, Siemens, and Nextcloud. 

    A subset of vital vulnerabilities drew neighborhood and business consideration: 

    • CVE-2025-67494: A vital server-side request forgery (SSRF) flaw in ZITADEL, enabling unauthorized community pivoting and knowledge publicity. 
    • CVE-2025-66516: A extreme XML Exterior Entity (XXE) vulnerability in Apache Tika impacts modules comparable to tika-core, tika-pdf-module, and tika-parsers. 

    These IT vulnerabilities current a direct danger to organizations as a consequence of their potential to allow unauthorized entry, knowledge theft, and distant code execution. Throughout all disclosures, CRIL recognized 68 vital vulnerabilities beneath CVSS v3.1 and 23 rated vital beneath CVSS v4.0, making it one other high-activity week in vulnerability disclosure traits. 

    CISA – Recognized Exploited Vulnerabilities (KEV) Catalogue 

    Between December 3 and December 9, 2025, CISA added six new exploited vulnerabilities to its CVE catalog. 

    Notable additions embody: 

    • CVE-2025-6218: A listing traversal flaw in RARLAB WinRAR permits distant code execution (RCE). 
    • CVE-2025-55182: A vital pre-authentication RCE in React Server Elements (RSC) leveraging unsafe deserialization within the “Flight” protocol. 

    The exploitation of CVE-2025-55182 started round December 08, using payloads that diverged from the December 04 PoC publicly launched by researchers. The variant strategies counsel speedy adaptation by attackers following disclosure. 

    Notable Vulnerabilities Mentioned in Open-Supply Communities 

    CRIL recognized a number of trending vulnerabilities drawing consideration throughout open-source safety and analysis boards. 

    Key discussions included: 

    • CVE-2025-62221: A use-after-free elevation of privilege vulnerability within the Home windows Cloud Information Mini Filter Driver. An area attacker may acquire SYSTEM-level privileges, and the flaw could be chained with phishing or browser exploits for full host compromise. 
    • CVE-2025-10573: A vital saved XSS vulnerability in Ivanti Endpoint Supervisor, permitting distant unauthenticated attackers to embed malicious JavaScript that executes when an administrator views the dashboard. 

    Vulnerabilities Beneath Dialogue on the Darkish Internet 

    CRIL’s dark-web monitoring recognized a number of vulnerabilities actively mentioned, traded, or weaponized by risk actors: 

    • CVE-2025-6440: A vital arbitrary file add vulnerability within the WooCommerce Designer Professional plugin for WordPress (additionally distributed with the Pricom Printing Firm & Design Companies theme). Permits unauthenticated file add and distant code execution by way of malicious PHP internet shells. 
    • CVE-2025-55182: Additionally known as “React2Shell” or “React4Shell,” actively weaponized on underground boards. The flaw impacts React 19’s Server Elements Flight protocol and frameworks comparable to Subsequent.js. 
    • CVE-2025-66516: A extreme XXE vulnerability in Apache Tika. The administrator of the “Proxy Bar” Telegram channel circulated exploit materials demonstrating how malicious PDF information with embedded XFA varieties may obtain arbitrary file learn, SSRF, denial-of-service, and, in some circumstances, distant code execution. 

    CRIL’s vulnerability intelligence timeline notes: 

    CVE  Product  CVE Launch  DW Seize  PoC 
    CVE-2025-6440  WooCommerce Designer Professional  Oct 24, 2025  Dec 03, 2025  Sure 
    CVE-2025-55182  React Server Elements  Dec 03, 2025  Dec 05, 2025  Sure 
    CVE-2025-66516  Apache Tika Modules  Dec 04, 2025  Dec 08, 2025  Sure 

    High ICS Vulnerabilities Tracked This Week 

    CRIL highlighted a number of ICS vulnerabilities affecting industrial distributors throughout vitality, manufacturing, and business services. 

    Key points included: 

    • Sunbird – DCIM dcTrack & Energy IQ (≤ 9.2.0): Authentication bypass and hard-coded credentials vulnerabilities (CVSS 6.5 and 6.7), risking unauthorized entry and credential compromise. 
    • Johnson Controls OpenBlue Office (2025.1.2 and prior): A CVSS 9.3 Compelled Shopping vulnerability enabling unauthorized entry to delicate operations in vital infrastructure environments. 

    Throughout the ICS panorama, most vulnerabilities have been medium severity, whereas business services, vital manufacturing, and vitality sectors accounted for 43% of complete incidents. Multi-sector points, together with IT, authorities, healthcare, and transportation, accounted for an extra 29%. 

    Suggestions and Mitigations 

    CRIL’s report reiterates important mitigation steps: 

    • Apply all vendor patches promptly, notably for vulnerabilities listed within the KEV catalog. 
    • Implement a structured patch administration program overlaying testing, deployment, and verification. 
    • Phase networks to isolate vital techniques and cut back lateral motion. 
    • Deploy complete monitoring and logging with SIEM correlation. 
    • Observe alerts from distributors, CERTs, and authorities authorities. 
    • Conduct routine VAPT workouts and safety audits. 
    • Keep visibility into inner and exterior property. 
    • Implement sturdy password insurance policies, exchange all default credentials, and undertake MFA throughout all environments. 

    Conclusion 

    The big selection of vulnerabilities recognized this week highlights the increasing risk panorama dealing with industrial and operational environments. Safety groups should act shortly and give attention to risk-based vulnerability administration to guard vital techniques. 

    Key practices, comparable to community segmentation, proscribing uncovered property, making use of Zero-Belief rules, sustaining resilient backups, hardening configurations, and steady monitoring, stay important for decreasing assault floor and bettering incident response readiness. 

    Cyble’s assault floor administration options can assist these efforts by detecting exposures throughout community and cloud environments, prioritizing remediation, and offering early indicators of potential cyberattacks. To see how Cyble can strengthen your industrial safety posture, request a demo at the moment. 

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    New Chrome Vulnerability Let Malicious Extensions Escalate Privileges through Gemini Panel

    March 2, 2026

    MSHTML Zero-Day in Home windows Exploited by APT28 Previous to Feb 2026 Safety Replace

    March 2, 2026

    How CISOs can construct a resilient workforce

    March 2, 2026
    Top Posts

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025

    Meta resumes AI coaching utilizing EU person knowledge

    April 18, 2025
    Don't Miss

    Fixing the Pupil Debt Disaster with U.S. Information CEO Eric Gertler

    By Charlotte LiMarch 3, 2026

    http://visitors.libsyn.com/futureofworkpodcast/Audio_-_Eric_Gertler_-_Ready.mp3 Let’s be trustworthy, most CHRO teams on the market are dangerous. They’re costly, crammed…

    Reduce Doc AI Prices 90%

    March 3, 2026

    A Newbie’s Studying Checklist for Giant Language Fashions for 2026

    March 2, 2026

    Educating college students AI expertise and serving to nook shops go digital, too.

    March 2, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.