Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Improperly Patched Samsung MagicINFO Vulnerability Exploited by Botnet

Improperly Patched Samsung MagicINFO Vulnerability Exploited by Botnet

Posted on May 8, 2025May 8, 2025 By CWS

The patches for an exploited Samsung MagicINFO content material administration system (CMS) vulnerability seem ineffective as risk actors are exploiting it towards up to date methods, safety agency Huntress warns.

The problem, tracked as CVE-2024-7399 (CVSS rating of 8.8) and described because the improper sanitization of consumer enter, permits unauthenticated attackers to add JSP information and execute arbitrary code on the server with system privileges.

Fixes for the flaw have been introduced in August 2024, whereas its in-the-wild exploitation was flagged earlier this week, after proof-of-concept (PoC) exploit code was made public.

Cybersecurity agency Arctic Wolf, which warned of the bug’s exploitation, urged customers to replace to MagicINFO 9 Server model 21.1050 or newer to remain protected, however now Huntress says that the 21.1050 launch too is affected by the vulnerability.

“Huntress additionally noticed exploitation within the wild; nonetheless, a number of the methods impacted had the most recent obtainable patch, which strengthened the idea that the most recent obtainable model (21.1050.0) was certainly nonetheless weak,” the safety agency notes.

The publicly obtainable PoC, Huntress says, works towards variations 21.1050.0 and 21.1040.2 of MagicINFO 9 Server, that means that no repair is presently obtainable for the bug.

“It will possibly solely be concluded that the patch from August 2024 was both incomplete or for a separate, however related, vulnerability,” Huntress says.

The corporate’s report validates an SSD Disclosure advisory stating that the most recent MagicINFO 9 Server launch is impacted by a number of vulnerabilities that enable unauthenticated attackers to execute arbitrary server-side code.Commercial. Scroll to proceed studying.

“These vulnerabilities collectively enable an unauthenticated consumer to add an online shell and obtain distant code execution below the Apache Tomcat course of,” Huntress notes.

Based on SSD Disclosure, Samsung was notified of those safety defects on January 12, 2025, however marked the report as duplicate.

Shortly after the bug’s exploitation got here to gentle, SANS’s Johannes Ullrich warned {that a} Mirai-based botnet has been concentrating on weak MagicINFO CMS situations.

Huntress recommends that customers disconnect their MagicINFO 9 servers from the web till a correct patch is launched.

Associated: Second Wave of Assaults Hitting SAP NetWeaver After Zero-Day Compromise

Associated: Second OttoKit Vulnerability Exploited to Hack WordPress Websites

Associated: Android Replace Patches FreeType Vulnerability Exploited as Zero-Day

Associated: PoC Revealed for Exploited SonicWall Vulnerabilities

Security Week News Tags:Botnet, Exploited, Improperly, MagicINFO, Patched, Samsung, Vulnerability

Post navigation

Previous Post: Possible Zero-Day Patched in SonicWall SMA Appliances
Next Post: Microsoft Bookings Vulnerability Let Attackers Alter the Meeting Details

Related Posts

Ox Security Bags M Series B to Tackle Appsec Alert Fatigue  Ox Security Bags $60M Series B to Tackle Appsec Alert Fatigue  Security Week News
PromptLock: First AI-Powered Ransomware Emerges PromptLock: First AI-Powered Ransomware Emerges Security Week News
Dutch Teens Arrested for Allegedly Helping Russian Hackers Dutch Teens Arrested for Allegedly Helping Russian Hackers Security Week News
Webinar Today: AI and the Trust Dilemma: Balancing Innovation and Risk Webinar Today: AI and the Trust Dilemma: Balancing Innovation and Risk Security Week News
Malicious NPM Packages Target Cursor AI’s macOS Users Malicious NPM Packages Target Cursor AI’s macOS Users Security Week News
Industry Reactions to Trump Cybersecurity Executive Order: Feedback Friday Industry Reactions to Trump Cybersecurity Executive Order: Feedback Friday Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark