Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploiting Libraesva Email Security Gateway Vulnerability to Inject Malicious Commands

Posted on September 24, 2025September 24, 2025 By CWS

Libraesva has issued an emergency patch for a big command injection vulnerability in its E mail Safety Gateway (ESG) after confirming state-sponsored hackers exploited it.

The flaw, recognized as CVE-2025-59689, allowed attackers to execute arbitrary instructions by sending a malicious e mail with a specifically crafted compressed attachment. The corporate responded by deploying an automatic repair to prospects inside 17 hours of discovering the energetic exploitation.

The vulnerability originates from improper sanitization when the ESG product processes sure compressed archive codecs. Attackers may assemble a malicious e mail attachment that, when scanned by the gateway, would bypass safety checks and permit the injection of shell instructions.

A profitable exploit would grant the attacker the power to execute arbitrary instructions on the affected system, albeit as a non-privileged person.

From there, the actor may probably have interaction in lateral motion, set up persistence, or try and escalate privileges. The flaw impacts all Libraesva ESG variations from 4.5 onwards.

Libraesva confirmed at the very least one incident the place the vulnerability was actively abused within the wild. The corporate attributes the assault to a “international hostile state entity,” highlighting the subtle nature of the menace actor.

In keeping with Libraesva, the focused nature of the assault, which targeted on a single equipment, underscores the precision and strategic intent of the adversary.

This focused method suggests the attackers weren’t conducting a widespread marketing campaign however reasonably a targeted operation in opposition to a selected group.

In response to the exploit, Libraesva took swift motion, creating and deploying a patch in simply 17 hours. The emergency replace was routinely pushed to all cloud-based and on-premise ESG home equipment working model 5.x.

The great patch not solely addressed the basis sanitization flaw but additionally included an automatic scanner to detect Indicators of Compromise (IoCs) and a self-assessment module to confirm the patch’s integrity.

Libraesva has supplied the next steering for its prospects:

Cloud Prospects: All cloud home equipment have been routinely up to date, and no additional motion is required.

On-Premise 5.x Prospects: These home equipment ought to have obtained the automated replace. Directors are suggested to confirm that their system is working a patched model.

On-Premise 4.x Prospects: Variations beneath 5.0 are Finish of Help (EOS) and didn’t obtain the automated patch. These prospects should manually improve to a supported 5.x model to guard their techniques from this exploited vulnerability.

The fixes can be found in variations 5.0.31, 5.1.20, 5.2.31, 5.3.16, 5.4.8, and 5.5.7. Given the energetic exploitation by a nation-state actor, organizations utilizing Libraesva ESG are urged to make sure their home equipment are working a patched model instantly.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Commands, Email, Exploiting, Gateway, Hackers, Inject, Libraesva, Malicious, Security, Vulnerability

Post navigation

Previous Post: ShadowV2 Botnet Exploits Docker Containers on AWS to Turn Thems as Infected System for DDoS Attack
Next Post: GitHub Boosting Security in Response to NPM Supply Chain Attacks 

Related Posts

Hackers Can Manipulate BitLocker Registry Keys Via WMI to Execute Malicious Code as Interactive User Cyber Security News
Google’s New AI Agent, CodeMender, Automatically Rewrites Vulnerable Code Cyber Security News
Linux Firewall IPFire 2.29 Core Update 195 Released With VPN Protocol Support Cyber Security News
United Natural Foods Suffers Cyberattack Cyber Security News
New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands Cyber Security News
Columbia University Data Breach – Hackers Stolen 870,000 Individuals Personal and Financial Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic
  • Seven QNAP Zero-Day Vulnerabilities Exploited at Pwn2Own 2025 Now Patched
  • Google Maps Adds Feature for Businesses to Report Ransom Demands for Removing Bad Reviews
  • Hackers Hijack Samsung Galaxy Phones via 0-Day Exploit Using a Single WhatsApp Image
  • Threat Actors Leveraging RDP Credentials to Deploy Cephalus Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic
  • Seven QNAP Zero-Day Vulnerabilities Exploited at Pwn2Own 2025 Now Patched
  • Google Maps Adds Feature for Businesses to Report Ransom Demands for Removing Bad Reviews
  • Hackers Hijack Samsung Galaxy Phones via 0-Day Exploit Using a Single WhatsApp Image
  • Threat Actors Leveraging RDP Credentials to Deploy Cephalus Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News