Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Libraesva Email Security Gateway Vulnerability Exploited by Nation-State Hackers

Posted on September 24, 2025September 24, 2025 By CWS

Libraesva has addressed a vulnerability in its built-in e mail safety platform that has been exploited within the wild.

Tracked as CVE-2025-59689 (CVSS rating of 6.1), the flaw is described as a command injection difficulty that might result in the execution of arbitrary instructions as a non-privileged consumer.

In keeping with Libraesva’s advisory, the bug may very well be exploited through malicious emails containing crafted compressed attachments.

“This happens as a result of an improper sanitization in the course of the removing of lively code from recordsdata contained in some compressed archive codecs,” the corporate explains.

The CVE is triggered with particular archive codecs containing payloads that exploit an improper enter sanitization bug to execute arbitrary shell instructions.

The safety defect impacts Libraesva ESG variations 4.5 by 5.5, however fixes have been launched just for ESG 5.x variations, because the 4.x variations have been discontinued.

Libraesva pushed the patches to each cloud and on-premise ESG deployments and says all home equipment are actually operating a hard and fast software program iteration.

Clients operating on-premise ESG 4.x variations are suggested to manually replace to a patched 5.x model as quickly as doable, provided that the vulnerability has been exploited.Commercial. Scroll to proceed studying.

“One confirmed incident of abuse has been recognized. The risk actor is believed to be a overseas hostile state entity,” Libraesva says.

“The only‑equipment focus underscores the precision of the risk actor (believed to be a overseas hostile state) and highlights the significance of speedy, complete patch deployment,” the corporate notes.

Along with resolving the flaw, Libraesva’s patches scan for indicators-of-compromise (IoCs) and comprise a self-assessment module that checks the patch integrity and hunts for residual threats.

An built-in resolution, Libraesva ESG protects e mail companies from phishing, BEC, and superior threats, and is suited for every type of organizations, together with small and medium-sized companies and huge enterprises.

Associated: SolarWinds Makes Third Try at Patching Exploited Vulnerability

Associated: Patch Bypassed for Supermicro Vulnerability Permitting BMC Hack

Associated: Prime 25 MCP Vulnerabilities Reveal How AI Brokers Can Be Exploited

Associated: Researchers Earn $150,000 for L1TF Exploit Leaking Knowledge From Public Cloud

Security Week News Tags:Email, Exploited, Gateway, Hackers, Libraesva, NationState, Security, Vulnerability

Post navigation

Previous Post: Hackers Exploit Pandoc CVE-2025-51591 to Target AWS IMDS and Steal EC2 IAM Credentials
Next Post: Attackers Can Exploit WerFaultSecure.exe Tool to Steal Cached Passwords From Windows 11 24H2

Related Posts

Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones Security Week News
Recent Langflow Vulnerability Exploited by Flodrix Botnet Security Week News
Dutch Teens Arrested for Allegedly Helping Russian Hackers Security Week News
Law Firms Warned of Silent Ransom Group Attacks Security Week News
Canada Says Hackers Tampered With ICS at Water Facility, Oil and Gas Firm Security Week News
Cyberattack Targets International Criminal Court Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic
  • Seven QNAP Zero-Day Vulnerabilities Exploited at Pwn2Own 2025 Now Patched
  • Google Maps Adds Feature for Businesses to Report Ransom Demands for Removing Bad Reviews
  • Hackers Hijack Samsung Galaxy Phones via 0-Day Exploit Using a Single WhatsApp Image
  • Threat Actors Leveraging RDP Credentials to Deploy Cephalus Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic
  • Seven QNAP Zero-Day Vulnerabilities Exploited at Pwn2Own 2025 Now Patched
  • Google Maps Adds Feature for Businesses to Report Ransom Demands for Removing Bad Reviews
  • Hackers Hijack Samsung Galaxy Phones via 0-Day Exploit Using a Single WhatsApp Image
  • Threat Actors Leveraging RDP Credentials to Deploy Cephalus Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News