Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploiting Libraesva Email Security Gateway Vulnerability to Inject Malicious Commands

Posted on September 24, 2025September 24, 2025 By CWS

Libraesva has issued an emergency patch for a big command injection vulnerability in its E mail Safety Gateway (ESG) after confirming state-sponsored hackers exploited it.

The flaw, recognized as CVE-2025-59689, allowed attackers to execute arbitrary instructions by sending a malicious e mail with a specifically crafted compressed attachment. The corporate responded by deploying an automatic repair to prospects inside 17 hours of discovering the energetic exploitation.

The vulnerability originates from improper sanitization when the ESG product processes sure compressed archive codecs. Attackers may assemble a malicious e mail attachment that, when scanned by the gateway, would bypass safety checks and permit the injection of shell instructions.

A profitable exploit would grant the attacker the power to execute arbitrary instructions on the affected system, albeit as a non-privileged person.

From there, the actor may probably have interaction in lateral motion, set up persistence, or try and escalate privileges. The flaw impacts all Libraesva ESG variations from 4.5 onwards.

Libraesva confirmed at the very least one incident the place the vulnerability was actively abused within the wild. The corporate attributes the assault to a “international hostile state entity,” highlighting the subtle nature of the menace actor.

In keeping with Libraesva, the focused nature of the assault, which targeted on a single equipment, underscores the precision and strategic intent of the adversary.

This focused method suggests the attackers weren’t conducting a widespread marketing campaign however reasonably a targeted operation in opposition to a selected group.

In response to the exploit, Libraesva took swift motion, creating and deploying a patch in simply 17 hours. The emergency replace was routinely pushed to all cloud-based and on-premise ESG home equipment working model 5.x.

The great patch not solely addressed the basis sanitization flaw but additionally included an automatic scanner to detect Indicators of Compromise (IoCs) and a self-assessment module to confirm the patch’s integrity.

Libraesva has supplied the next steering for its prospects:

Cloud Prospects: All cloud home equipment have been routinely up to date, and no additional motion is required.

On-Premise 5.x Prospects: These home equipment ought to have obtained the automated replace. Directors are suggested to confirm that their system is working a patched model.

On-Premise 4.x Prospects: Variations beneath 5.0 are Finish of Help (EOS) and didn’t obtain the automated patch. These prospects should manually improve to a supported 5.x model to guard their techniques from this exploited vulnerability.

The fixes can be found in variations 5.0.31, 5.1.20, 5.2.31, 5.3.16, 5.4.8, and 5.5.7. Given the energetic exploitation by a nation-state actor, organizations utilizing Libraesva ESG are urged to make sure their home equipment are working a patched model instantly.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Commands, Email, Exploiting, Gateway, Hackers, Inject, Libraesva, Malicious, Security, Vulnerability

Post navigation

Previous Post: ShadowV2 Botnet Exploits Docker Containers on AWS to Turn Thems as Infected System for DDoS Attack
Next Post: GitHub Boosting Security in Response to NPM Supply Chain Attacks 

Related Posts

Multiple GitLab Vulnerabilities Allow Attackers to Achieve Complete Account Takeover Cyber Security News
Iran-Nexus Hackers Abuses Omani Mailbox to Target Global Governments Cyber Security News
5 Email Attacks SOCs Cannot Detect Without A Sandbox  Cyber Security News
Russian Hackers Leverage Oracle Cloud Infrastructure to Scaleway Object Storage Cyber Security News
What Is Out-of-Bounds Read and Write Vulnerability? Cyber Security News
How Winning SOCs Always Stay Ahead of Threats  Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • GeoServer Flaw Exploited in US Federal Agency Hack
  • UK Police Arrested Man Linked to Ransomware Attack That Crippeled European Airports
  • European Airport Cyberattack Linked to Obscure Ransomware, Suspect Arrested
  • How One Bad Password Ended a 158-Year-Old Business
  • Hackers Can Bypass EDR by Downloading Malicious File as In-Memory PE Loader

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • GeoServer Flaw Exploited in US Federal Agency Hack
  • UK Police Arrested Man Linked to Ransomware Attack That Crippeled European Airports
  • European Airport Cyberattack Linked to Obscure Ransomware, Suspect Arrested
  • How One Bad Password Ended a 158-Year-Old Business
  • Hackers Can Bypass EDR by Downloading Malicious File as In-Memory PE Loader

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News