Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Companies Warned of Commvault Vulnerability Exploitation

Posted on May 23, 2025May 23, 2025 By CWS

The continued exploitation of a Commvault vulnerability that was focused as a zero-day is probably going a part of a broader marketing campaign towards software-as-a-service (SaaS) options, the US cybersecurity company CISA says.

Tracked as CVE-2025-3928 (CVSS rating of 8.7), the unspecified safety defect permits distant attackers to create and execute webshells, totally compromising weak situations.

Commvault mounted the bug in late February, warning that it discovered from Microsoft {that a} suspected state-sponsored risk actor had exploited it as a zero-day to hack into its Azure surroundings. In late April, CISA added the vulnerability to the KEV catalog.

In early Might, the corporate up to date its safety advisory to warn that risk actors “could have accessed a subset of app credentials that sure Commvault prospects use to authenticate their M365 environments.”

To assist prospects hunt for potential compromise, Commvault has offered indicators of compromise (IoCs) related to the noticed exercise. It additionally rotated credentials and strengthened monitoring guidelines as a remediation motion.

The malicious exercise, the corporate has revealed, solely impacted a small variety of prospects it has in frequent with Microsoft, however didn’t contain unauthorized entry to buyer backups saved by Commvault.

In accordance with CISA, the attackers might need exploited CVE-2025-3928 to entry shopper secrets and techniques for Commvault’s M365 backup SaaS resolution hosted in Azure, leading to unauthorized entry to “Commvault’s prospects’ M365 environments which have utility secrets and techniques saved by Commvault.”

“CISA believes the risk exercise could also be half of a bigger marketing campaign focusing on numerous SaaS corporations’ cloud purposes with default configurations and elevated permissions,” the company notes.Commercial. Scroll to proceed studying.

Organizations are suggested to watch Entra audit logs, think about irregular logins as suspicious, conduct inner risk looking, implement conditional entry insurance policies, rotate Commvault Metallic utility secrets and techniques, rotate utility credentials, evaluation administrative privileges, and implement robust M365 safety.

For on-premises deployments, organizations ought to limit entry to Commvault administration interfaces, detect and block path-traversal makes an attempt, block suspicious file uploads, apply the mandatory patches, and monitor exercise from sudden directories.

Associated: Crucial Commvault Vulnerability in Attacker Crosshairs

Associated: Stolen Credentials Have Turned SaaS Apps Into Attackers’ Playgrounds

Associated: Microsoft Purges Dormant Azure Tenants, Rotates Keys to Stop Repeat Nation-State Hack

Associated: Chinese language Spies Exploit Ivanti Vulnerabilities Towards Crucial Sectors

Security Week News Tags:Commvault, Companies, Exploitation, Vulnerability, Warned

Post navigation

Previous Post: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection
Next Post: 300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide

Related Posts

Russian APT Exploiting 7-Year-Old Cisco Vulnerability: FBI Security Week News
Google Warns of Vishing, Extortion Campaign Targeting Salesforce Customers Security Week News
Data Breach at Debt Settlement Firm Impacts 160,000 People Security Week News
Chrome 142 Update Patches High-Severity Flaws Security Week News
Chrome to Turn HTTPS on by Default for Public Sites Security Week News
GitHub Workflows Attack Affects Hundreds of Repos, Thousands of Secrets Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark