Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploiting Libraesva Email Security Gateway Vulnerability to Inject Malicious Commands

Posted on September 24, 2025September 24, 2025 By CWS

Libraesva has issued an emergency patch for a big command injection vulnerability in its E mail Safety Gateway (ESG) after confirming state-sponsored hackers exploited it.

The flaw, recognized as CVE-2025-59689, allowed attackers to execute arbitrary instructions by sending a malicious e mail with a specifically crafted compressed attachment. The corporate responded by deploying an automatic repair to prospects inside 17 hours of discovering the energetic exploitation.

The vulnerability originates from improper sanitization when the ESG product processes sure compressed archive codecs. Attackers may assemble a malicious e mail attachment that, when scanned by the gateway, would bypass safety checks and permit the injection of shell instructions.

A profitable exploit would grant the attacker the power to execute arbitrary instructions on the affected system, albeit as a non-privileged person.

From there, the actor may probably have interaction in lateral motion, set up persistence, or try and escalate privileges. The flaw impacts all Libraesva ESG variations from 4.5 onwards.

Libraesva confirmed at the very least one incident the place the vulnerability was actively abused within the wild. The corporate attributes the assault to a “international hostile state entity,” highlighting the subtle nature of the menace actor.

In keeping with Libraesva, the focused nature of the assault, which targeted on a single equipment, underscores the precision and strategic intent of the adversary.

This focused method suggests the attackers weren’t conducting a widespread marketing campaign however reasonably a targeted operation in opposition to a selected group.

In response to the exploit, Libraesva took swift motion, creating and deploying a patch in simply 17 hours. The emergency replace was routinely pushed to all cloud-based and on-premise ESG home equipment working model 5.x.

The great patch not solely addressed the basis sanitization flaw but additionally included an automatic scanner to detect Indicators of Compromise (IoCs) and a self-assessment module to confirm the patch’s integrity.

Libraesva has supplied the next steering for its prospects:

Cloud Prospects: All cloud home equipment have been routinely up to date, and no additional motion is required.

On-Premise 5.x Prospects: These home equipment ought to have obtained the automated replace. Directors are suggested to confirm that their system is working a patched model.

On-Premise 4.x Prospects: Variations beneath 5.0 are Finish of Help (EOS) and didn’t obtain the automated patch. These prospects should manually improve to a supported 5.x model to guard their techniques from this exploited vulnerability.

The fixes can be found in variations 5.0.31, 5.1.20, 5.2.31, 5.3.16, 5.4.8, and 5.5.7. Given the energetic exploitation by a nation-state actor, organizations utilizing Libraesva ESG are urged to make sure their home equipment are working a patched model instantly.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Commands, Email, Exploiting, Gateway, Hackers, Inject, Libraesva, Malicious, Security, Vulnerability

Post navigation

Previous Post: ShadowV2 Botnet Exploits Docker Containers on AWS to Turn Thems as Infected System for DDoS Attack
Next Post: GitHub Boosting Security in Response to NPM Supply Chain Attacks 

Related Posts

FBI Atlanta Seizes Major Video Game Piracy Websites in International Operation Cyber Security News
Sidewinder APT Hackers Leverage Nepal Protests to Push Mobile and Windows Malware Cyber Security News
New Smartwatch Wi-Fi Injection, Android Radio and Hacking Tools Cyber Security News
WAFs protection Bypassed to Execute XSS Payloads Using JS Injection with Parameter Pollution Cyber Security News
Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach Cyber Security News
Microsoft Purview DLP to Restrict Microsoft 365 Copilot in Processing Emails With Sensitive Labels Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic
  • Seven QNAP Zero-Day Vulnerabilities Exploited at Pwn2Own 2025 Now Patched
  • Google Maps Adds Feature for Businesses to Report Ransom Demands for Removing Bad Reviews
  • Hackers Hijack Samsung Galaxy Phones via 0-Day Exploit Using a Single WhatsApp Image
  • Threat Actors Leveraging RDP Credentials to Deploy Cephalus Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic
  • Seven QNAP Zero-Day Vulnerabilities Exploited at Pwn2Own 2025 Now Patched
  • Google Maps Adds Feature for Businesses to Report Ransom Demands for Removing Bad Reviews
  • Hackers Hijack Samsung Galaxy Phones via 0-Day Exploit Using a Single WhatsApp Image
  • Threat Actors Leveraging RDP Credentials to Deploy Cephalus Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News