Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Libraesva Email Security Gateway Vulnerability Exploited by Nation-State Hackers

Posted on September 24, 2025September 24, 2025 By CWS

Libraesva has addressed a vulnerability in its built-in e mail safety platform that has been exploited within the wild.

Tracked as CVE-2025-59689 (CVSS rating of 6.1), the flaw is described as a command injection difficulty that might result in the execution of arbitrary instructions as a non-privileged consumer.

In keeping with Libraesva’s advisory, the bug may very well be exploited through malicious emails containing crafted compressed attachments.

“This happens as a result of an improper sanitization in the course of the removing of lively code from recordsdata contained in some compressed archive codecs,” the corporate explains.

The CVE is triggered with particular archive codecs containing payloads that exploit an improper enter sanitization bug to execute arbitrary shell instructions.

The safety defect impacts Libraesva ESG variations 4.5 by 5.5, however fixes have been launched just for ESG 5.x variations, because the 4.x variations have been discontinued.

Libraesva pushed the patches to each cloud and on-premise ESG deployments and says all home equipment are actually operating a hard and fast software program iteration.

Clients operating on-premise ESG 4.x variations are suggested to manually replace to a patched 5.x model as quickly as doable, provided that the vulnerability has been exploited.Commercial. Scroll to proceed studying.

“One confirmed incident of abuse has been recognized. The risk actor is believed to be a overseas hostile state entity,” Libraesva says.

“The only‑equipment focus underscores the precision of the risk actor (believed to be a overseas hostile state) and highlights the significance of speedy, complete patch deployment,” the corporate notes.

Along with resolving the flaw, Libraesva’s patches scan for indicators-of-compromise (IoCs) and comprise a self-assessment module that checks the patch integrity and hunts for residual threats.

An built-in resolution, Libraesva ESG protects e mail companies from phishing, BEC, and superior threats, and is suited for every type of organizations, together with small and medium-sized companies and huge enterprises.

Associated: SolarWinds Makes Third Try at Patching Exploited Vulnerability

Associated: Patch Bypassed for Supermicro Vulnerability Permitting BMC Hack

Associated: Prime 25 MCP Vulnerabilities Reveal How AI Brokers Can Be Exploited

Associated: Researchers Earn $150,000 for L1TF Exploit Leaking Knowledge From Public Cloud

Security Week News Tags:Email, Exploited, Gateway, Hackers, Libraesva, NationState, Security, Vulnerability

Post navigation

Previous Post: Hackers Exploit Pandoc CVE-2025-51591 to Target AWS IMDS and Steal EC2 IAM Credentials
Next Post: Attackers Can Exploit WerFaultSecure.exe Tool to Steal Cached Passwords From Windows 11 24H2

Related Posts

200,000 Harbin Clinic Patients Impacted by NRS Data Breach Security Week News
Telecom Giant Orange Hit by Cyberattack Security Week News
OT Networks Targeted in Widespread Exploitation of Erlang/OTP Vulnerability Security Week News
Cityworks Zero-Day Exploited by Chinese Hackers in US Local Government Attacks Security Week News
CISA Requests Public Feedback on Updated SBOM Guidance Security Week News
Organizations Warned of Exploited PaperCut Flaw Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • GitHub Boosting Security in Response to NPM Supply Chain Attacks 
  • Hackers Exploiting Libraesva Email Security Gateway Vulnerability to Inject Malicious Commands
  • ShadowV2 Botnet Exploits Docker Containers on AWS to Turn Thems as Infected System for DDoS Attack
  • Record-Breaking DDoS Attack Peaks at 22 Tbps and 10 Bpps
  • SonicWall Updates SMA 100 Appliances to Remove Overstep Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • GitHub Boosting Security in Response to NPM Supply Chain Attacks 
  • Hackers Exploiting Libraesva Email Security Gateway Vulnerability to Inject Malicious Commands
  • ShadowV2 Botnet Exploits Docker Containers on AWS to Turn Thems as Infected System for DDoS Attack
  • Record-Breaking DDoS Attack Peaks at 22 Tbps and 10 Bpps
  • SonicWall Updates SMA 100 Appliances to Remove Overstep Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News