Cyber Daily 3/11: Security Cameras Hijacked into Botnet, Widespread PHP Vulnerability Attacks, Bluetooth Chip Identity Theft, Federal Contractor Vulnerability Disclosure Program

Cyber Daily 3/11: Security Cameras Hijacked into Botnet, Widespread PHP Vulnerability Attacks, Bluetooth Chip Identity Theft, Federal Contractor Vulnerability Disclosure Program

Good morning ONSEC Cyber Daily readers! Today's issue is packed with critical updates and insights from the cybersecurity world. We kick off with a warning about a top security camera maker's devices being hijacked into a botnet, a result of cybercriminals exploiting a command injection vulnerability. In other news, a critical PHP vulnerability is under widespread cyberattack, and experts are warning that this could soon become a global problem. The vulnerability, CVE-2024-4577, has a patch released in 2024, so if you haven't updated yet, now's the time. We also delve into the hidden commands in 1 billion Bluetooth chips that pose a significant risk for identity theft. Plus, we explore the dynamic duo of vulnerability scanning and penetration testing, and how they're shaping cybersecurity. In legislative news, a new vulnerability disclosure program for federal contractors has passed the House, while the cybersecurity risk with Commvault Webserver vulnerability is making headlines. On the patching front, Chrome has released a security update for multiple high-severity vulnerabilities, and Apache has also released patched versions for current Apache Camel 4 releases. Finally, we have a roundup of the latest cybersecurity podcasts and webinars, including insights from a 30-year IT channel veteran and incident response lessons from the field. Stay tuned for these stories and more in today's ONSEC Cyber Daily. Stay safe, stay informed!

Exploits Alert

  1. IP Camera Vulnerability Exploited for Botnet Building: Cybercriminals are exploiting a command injection vulnerability in an older IP camera model to construct a botnet. This highlights the need for regular security updates and patches for all IoT devices. Source: MSN and TechRadar
  2. Widespread Cyberattack Exploits Critical PHP Vulnerability: The CVE-2024-4577 vulnerability in PHP is under widespread cyberattack. This underscores the importance of timely patching and updating of software to prevent exploitation. Source: Cybersecurity Dive and SecurityWeek
  3. Hidden Commands in Bluetooth Chips Pose Identity Theft Risk: Hidden commands in 1 billion Bluetooth chips present a significant identity theft risk. This highlights the need for robust cybersecurity measures even in seemingly secure technologies. Source: Forbes
  4. Vulnerability Scanning and Penetration Testing as Cybersecurity's Dynamic Duo: The combination of vulnerability scanning and penetration testing is a powerful tool in the cybersecurity arsenal. This emphasizes the importance of a multi-faceted approach to cybersecurity. Source: Managed Services Journal
  5. Commvault Webserver Vulnerability Poses Cybersecurity Risk: The CV_2025_03_1 vulnerability in Commvault's webserver module could be exploited by cybercriminals, highlighting the need for robust security measures in all web-based applications. Source: The Cyber Express

Vulnerabilities & Patches

  1. Chrome Security Update - Patch for Multiple High-Severity Vulnerabilities: Google has released patches for multiple high-severity vulnerabilities in Chrome, including CVE-2025-1920 and CVE-2025-2135. These patches address confusion vulnerabilities and are critical for maintaining the security of Chrome users. Source: cybersecuritynews.com
  2. Apache Camel Vulnerability CVE-2025-27636 Less Severe Than Initially Reported: Apache has released patches for the Apache Camel 4 releases, including versions 4.10.2 and 4.8.5. A courtesy patch (3.22.4) is also planned for the end of the year. These patches address a vulnerability that was initially reported as more severe. Source: cyberkendra.com
  3. CISA Adds 2 VeraCore Vulnerabilities to Known Actively Exploit Vulnerability Catalog: The Cybersecurity and Infrastructure Security Agency (CISA) has added two VeraCore vulnerabilities, CVE-2024-57968 and CVE-2025-25181, to its Known Actively Exploit Vulnerability Catalog. A patch is available for CVE-2024-57968 in version 2024.4.2.1, but no patch is available for CVE-2025-25181 as of March 2025. Source: cybersecuritynews.com
  4. Experts warn this critical PHP vulnerability could be set to become a global problem: Experts have warned of a critical remote code execution (RCE) flaw in PHP, CVE-2024-4577. A patch was released in the summer of 2024, and users are urged to update now to protect against this vulnerability. Source: msn.com
  5. Apache Traffic Server Vulnerabilities Let Attackers Perform Malformed Requests: Security teams are advised to prioritize patching intercept plugin vulnerabilities in the Apache Traffic Server. These vulnerabilities, including CVE-2025-27636, allow attackers to perform malformed requests. Source: cybersecuritynews.com

Podcasts

  1. 3205: The Legacy Tech Dilemma: Kyndryl's Strategy for Securing Aging Systems: This episode discusses the challenges of securing aging systems in the rapidly evolving cybersecurity landscape. The host explores Kyndryl's strategy for dealing with this issue. Source: iHeart
  2. APDR Podcast Episode 84 with host Kym Bergmann: The host discusses the worsening security situation for the western world, including Australia, due to the complete betrayal of Ukraine by the US. Source: Asia Pacific Defence Reporter
  3. Unlock cybersecurity success: A 30-year IT channel veteran shares his secrets: Tomas Sjostrom, president of James Moore Technology Services, shares his insights and secrets to success in the cybersecurity field, drawing from his 30 years of experience. Source: Managed Services Journal
  4. Michelle Obama and her brother to launch podcast with weekly guests: Former First Lady Michelle Obama and her brother are launching a new podcast with weekly guests. While not strictly cybersecurity-focused, the podcast is expected to cover a broad range of topics, potentially including cybersecurity. Source: Breaking News
  5. Webinar: Credential security in the age of AI: Insights for IT leaders: This episode of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault discusses the importance of credential security in the age of AI. Source: Graham Cluley

Final Words

And that's a wrap for today's edition of 'ONSEC Cyber Daily'. As we navigate the digital landscape, it's clear that the threats are evolving, but so too are the solutions. From botnets hijacking security cameras to critical PHP vulnerabilities under widespread attack, we're reminded of the importance of staying vigilant and informed. Remember, cybersecurity isn't just a one-person job. It's a collective effort. So, share this newsletter with your friends and colleagues. Let's spread the knowledge and fortify our defenses together. Stay safe, stay updated, and we'll see you in the next edition of 'ONSEC Cyber Daily'. Until then, keep your data secure and your systems patched.

x.com
ONSEC.io | LinkedIn
ONSEC.io | 1,839 followers on LinkedIn. Information security audits and penetration testing by a team of experts with an average experience of more than 7 years | ONSEC.io - is a penetration testing & in-depth security audit company with more than 13 years of experience on the market. Our team has already helped more than 300 companies be aware about possible system's vulnerabilities, including Republic, DMarket, LegionFarm, Parallels, Xsolla, Acronis, Manyсhat, Global Fashion Group and others. Our main goal is to increase the customer security level by finding and fixing security issues as well as improve security awareness inside the company, including developers, DevOps, and other teams to build a sustainable engineering culture with security knowledge.