Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Metasploit Update: New Exploits Target Linux, BeyondTrust

Metasploit Update: New Exploits Target Linux, BeyondTrust

Posted on February 28, 2026 By CWS

The recent Metasploit update, unveiled on February 27, 2026, introduces a suite of tools designed to aid security professionals and penetration testers in their efforts. The update brings seven innovative modules, enhances nine existing features, and resolves several critical bugs.

Enhanced Exploit Modules

This release stands out with its introduction of remote code execution (RCE) exploits that target platforms such as Ollama, BeyondTrust, and Grandstream VoIP devices. These exploits are particularly notable for their advanced evasion tactics in Linux settings.

The update addresses high-severity vulnerabilities in enterprise and AI infrastructures. For instance, the Ollama Model Registry Path Traversal (CVE-2024-37032) flaw, with a CVSS score of 8.8, enables attackers to manipulate Ollama’s pull mechanism, leading to unauthorized root RCE after loading a malicious library.

Critical Vulnerabilities Addressed

Among the critical vulnerabilities, the BeyondTrust Privileged Remote Access and Remote Support appliances are affected by a command injection flaw (CVE-2026-1731), boasting a CVSS score of 9.9. This vulnerability allows unauthorized command execution, and the update incorporates a new helper library to facilitate future module development.

Additionally, the Grandstream GXP1600 VoIP devices face a stack overflow vulnerability (CVE-2026-2329), with a CVSS score of 9.3. This flaw enables attackers to gain root access, leading to potential credential theft and SIP traffic monitoring.

New Evasion and Persistence Features

A noteworthy addition is the first Linux evasion module for ARM64 architectures, utilizing RC4 encryption and memory execution of ELF binaries. The module employs sleep evasion to circumvent detection.

Furthermore, persistence modules for Windows and the Windows Subsystem for Linux (WSL) have been introduced. The WSL module implements payloads within the user’s startup folder, whereas the Windows Active Setup module uses OS features for payload execution, albeit with reduced permissions.

Improvements and Bug Fixes

Classic modules have received significant enhancements, including improved checking methods and native Meterpreter payloads for the Unreal IRCd and vsftpd backdoor modules. The SolarWinds exploit now automatically selects the appropriate SRVHOST, and a new check method enhances MS17-010 automation.

Bug fixes have also been applied to the LDAP ESC and GraphQL Introspection scanners, resolving previous issues such as crashes and false positives. These updates ensure a more efficient and reliable security testing process.

Stay updated with daily cybersecurity news by following us on Google News, LinkedIn, and X. Reach out to feature your cybersecurity stories.

Cyber Security News Tags:AI, BeyondTrust, Cybersecurity, Exploit, Linux, Linux RC4, Metasploit, module update, penetration testing, remote code execution, Security, VoIP, Vulnerabilities, Windows

Post navigation

Previous Post: Pentagon Labels Anthropic a Supply Chain Risk Amid AI Dispute
Next Post: Google Cloud API Key Exposure Risks Highlighted in New Study

Related Posts

WhatsApp Denies Lawsuit Claim and Confirms Messages are Device-encrypted and Private WhatsApp Denies Lawsuit Claim and Confirms Messages are Device-encrypted and Private Cyber Security News
Hackers Registered 18,000 Holiday-Themed Domains Targeting ‘Christmas,’ ‘Black Friday,’ and ‘Flash Sale’ Hackers Registered 18,000 Holiday-Themed Domains Targeting ‘Christmas,’ ‘Black Friday,’ and ‘Flash Sale’ Cyber Security News
Europol‑Backed Operation Leads to 34 Arrests in Black Axe Crime Network Bust Europol‑Backed Operation Leads to 34 Arrests in Black Axe Crime Network Bust Cyber Security News
Automatic BitLocker Encryption May Silently Lock Away Your Data Automatic BitLocker Encryption May Silently Lock Away Your Data Cyber Security News
Microsoft Introduces Researcher in Microsoft 365 Copilot, a Secure Virtual Assistant for Your Computer Microsoft Introduces Researcher in Microsoft 365 Copilot, a Secure Virtual Assistant for Your Computer Cyber Security News
Microsoft Teams Issue Blocks Users From Opening Embedded Office Documents Microsoft Teams Issue Blocks Users From Opening Embedded Office Documents Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Exploit Windows File Explorer for Malware Delivery
  • Canadian Tire Data Breach Exposes Millions of Accounts
  • Google Cloud API Key Exposure Risks Highlighted in New Study
  • Metasploit Update: New Exploits Target Linux, BeyondTrust
  • Pentagon Labels Anthropic a Supply Chain Risk Amid AI Dispute

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Exploit Windows File Explorer for Malware Delivery
  • Canadian Tire Data Breach Exposes Millions of Accounts
  • Google Cloud API Key Exposure Risks Highlighted in New Study
  • Metasploit Update: New Exploits Target Linux, BeyondTrust
  • Pentagon Labels Anthropic a Supply Chain Risk Amid AI Dispute

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News