Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Improperly Patched Samsung MagicINFO Vulnerability Exploited by Botnet

Posted on May 8, 2025May 8, 2025 By CWS

The patches for an exploited Samsung MagicINFO content material administration system (CMS) vulnerability seem ineffective as risk actors are exploiting it towards up to date methods, safety agency Huntress warns.

The problem, tracked as CVE-2024-7399 (CVSS rating of 8.8) and described because the improper sanitization of consumer enter, permits unauthenticated attackers to add JSP information and execute arbitrary code on the server with system privileges.

Fixes for the flaw have been introduced in August 2024, whereas its in-the-wild exploitation was flagged earlier this week, after proof-of-concept (PoC) exploit code was made public.

Cybersecurity agency Arctic Wolf, which warned of the bug’s exploitation, urged customers to replace to MagicINFO 9 Server model 21.1050 or newer to remain protected, however now Huntress says that the 21.1050 launch too is affected by the vulnerability.

“Huntress additionally noticed exploitation within the wild; nonetheless, a number of the methods impacted had the most recent obtainable patch, which strengthened the idea that the most recent obtainable model (21.1050.0) was certainly nonetheless weak,” the safety agency notes.

The publicly obtainable PoC, Huntress says, works towards variations 21.1050.0 and 21.1040.2 of MagicINFO 9 Server, that means that no repair is presently obtainable for the bug.

“It will possibly solely be concluded that the patch from August 2024 was both incomplete or for a separate, however related, vulnerability,” Huntress says.

The corporate’s report validates an SSD Disclosure advisory stating that the most recent MagicINFO 9 Server launch is impacted by a number of vulnerabilities that enable unauthenticated attackers to execute arbitrary server-side code.Commercial. Scroll to proceed studying.

“These vulnerabilities collectively enable an unauthenticated consumer to add an online shell and obtain distant code execution below the Apache Tomcat course of,” Huntress notes.

Based on SSD Disclosure, Samsung was notified of those safety defects on January 12, 2025, however marked the report as duplicate.

Shortly after the bug’s exploitation got here to gentle, SANS’s Johannes Ullrich warned {that a} Mirai-based botnet has been concentrating on weak MagicINFO CMS situations.

Huntress recommends that customers disconnect their MagicINFO 9 servers from the web till a correct patch is launched.

Associated: Second Wave of Assaults Hitting SAP NetWeaver After Zero-Day Compromise

Associated: Second OttoKit Vulnerability Exploited to Hack WordPress Websites

Associated: Android Replace Patches FreeType Vulnerability Exploited as Zero-Day

Associated: PoC Revealed for Exploited SonicWall Vulnerabilities

Security Week News Tags:Botnet, Exploited, Improperly, MagicINFO, Patched, Samsung, Vulnerability

Post navigation

Previous Post: Possible Zero-Day Patched in SonicWall SMA Appliances
Next Post: Microsoft Bookings Vulnerability Let Attackers Alter the Meeting Details

Related Posts

Zero-Day Attacks Highlight Another Busy Microsoft Patch Tuesday Security Week News
Radware Says Recently Disclosed WAF Bypasses Were Patched in 2023 Security Week News
In Other News: India-Pakistan Cyberattacks, Radware Vulnerabilities, xAI Leak Security Week News
Google Warns UK Retailer Hackers Now Targeting US Security Week News
Proofpoint to Acquire Hornetsecurity in Reported $1 Billion Deal Security Week News
Europol Announces More DDoS Service Takedowns, Arrests Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Remove Malware From Your PC
  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software
  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • How to Remove Malware From Your PC
  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software
  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News