Cyber Daily 3/6: Google and CISA Alert on Android and VMware Exploits, Vim Vulnerability Allows Code Execution, AI Soft Unveils Alli AI

Cyber Daily 3/6: Google and CISA Alert on Android and VMware Exploits, Vim Vulnerability Allows Code Execution, AI Soft Unveils Alli AI

Welcome to the ONSEC Cyber Daily newsletter for March 6th. Today, we're diving into a series of vulnerabilities that have been making waves in the cybersecurity world. First up, we have a newly discovered Vim vulnerability (CVE-2025-27423) that allows code execution via malicious TAR archives. This is a serious issue that could potentially allow cybercriminals to execute arbitrary code on your system. Next, we have an urgent alert from Google regarding exploited Android vulnerabilities. Adam Pilton, Senior Cybersecurity Consultant at CyberSmart, warns that these vulnerabilities could be exploited by cybercriminals. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has also issued an urgent alert regarding actively exploited VMware vulnerabilities. These vulnerabilities are severe and require immediate patching. In other news, AI Soft has announced the upcoming public release of Alli AI, an advanced artificial intelligence tool. Lastly, we have a series of podcasts that delve into various cybersecurity topics, from state-sponsored cyber warfare to the role of AI in healthcare. Stay tuned for more updates and remember to stay safe online!

Exploits Alert

  1. Vim Vulnerability (CVE-2025-27423) Allows Code Execution via Malicious TAR Archives: A new vulnerability in Vim, a popular text editor, allows for code execution via malicious TAR archives. Users are advised to update to the latest version to mitigate this risk. Source: GBHackers and Cyber Security News
  2. Google Issues Urgent Alert For Exploited Android Vulnerabilities: Google has issued an urgent alert for new vulnerabilities being exploited in Android devices. Users are advised to update their devices to the latest security patch to protect against these vulnerabilities. Source: Information Security Buzz
  3. CISA Warns of Actively Exploited VMware Vulnerabilities, Urges Immediate Patching: The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert about three critical vulnerabilities in VMware that are being actively exploited. Immediate patching is recommended. Source: Cyber Security News and GBHackers
  4. Chrome 134 Released, Fixes 14 Vulnerabilities That Could Crash the Browser: Google has released Chrome 134, which fixes 14 vulnerabilities that could crash the browser. Users are advised to update to the latest version to mitigate these vulnerabilities. Source: Cyber Security News
  5. Feds add Windows, router vulnerabilities to actively exploited list: The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added new Windows and router vulnerabilities to its list of actively exploited threats. Federal agencies are warned to patch these vulnerabilities immediately. Source: Mashable SEA

Vulnerabilities & Patches

  1. Google Issues Urgent Alert For Exploited Android Vulnerabilities: Google has issued an urgent alert for exploited Android vulnerabilities, particularly CVE-2024-43093. Enterprises are advised to monitor OEM advisories for delayed patches and audit patch compliance. Source: Information Security Buzz
  2. HPE Remote Support Tool Vulnerability Let Attackers Execute Arbitrary code: HPE's Insight Remote Support tool has a vulnerability (CVE-2024-53676) that allows attackers to execute arbitrary code. HPE has not yet released an official patch. Organizations using this tool should isolate management interfaces. Source: Cybersecurity News
  3. VMWare ESXi Vulnerabilities Exploited, Patch Now: Critical vulnerability CVE-2025-22224 in VMCI (Virtual Machine Communication Interface) of VMWare ESXi has been exploited. This vulnerability enables communication between guest and host. Immediate patching is recommended. Source: Gridinsoft
  4. Zoho ADSelfService Plus Vulnerability Let Attackers Gain Unauthorized Access: Zoho has patched a high-severity vulnerability (CVE-2025-1723) in its ADSelfService Plus software, a widely used self-service password management tool. The vulnerability could allow attackers to gain unauthorized access. Source: Cybersecurity News
  5. Chrome 134 Released, Fixes 14 Vulnerabilities That Could Crash the Browser: Google has released Chrome 134, which fixes 14 vulnerabilities, including CVE-2025-1915, a path traversal flaw in DevTools. The patch notably addresses exploits in core components like the V8. Source: Cybersecurity News

Podcasts

  1. No escaping it, China is trying to coerce us, with Mike Pezullo: This podcast episode discusses the expanding world of state-sponsored cyber warfare and the role of training in National Defence. Source: Defence Connect
  2. Tata Tech Cyber Attackers Come Forward, Polish Space Agency Cyberattack: This episode provides the latest news on cyber attacks, including the Tata Tech and Polish Space Agency incidents. Source: Substack
  3. 3200: CitiusTech on Trust, Transparency, and AI in Healthcare: This episode of Tech Talks Daily discusses how AI can drive innovation in healthcare while ensuring trust, security, and compliance. Source: iHeart
  4. US Treasury targets darknet kingpin: This episode from CyberWire discusses the US Treasury's actions against a darknet kingpin. Source: CyberWire
  5. Security Money: Sailpoint's IPO Saves the Index – BSW #385: This episode from SC Media discusses how Sailpoint's IPO has saved the index. Source: SC Media

Final Words

And that's a wrap for today's edition of ONSEC Cyber Daily. We hope you found this information valuable in staying ahead of the curve in this ever-evolving cyber landscape. Remember, knowledge is power, and sharing this power can make a world of difference. So, don't forget to share this newsletter with your friends and colleagues to help them stay informed and secure. In the world of cybersecurity, threats are always evolving, and so are we. Stay tuned for tomorrow's edition where we'll bring you the latest updates, alerts, and vulnerabilities from the cyber world. Until then, stay safe, stay secure. Remember, we're all in this together. Let's keep each other informed and protected.

x.com
ONSEC.io | LinkedIn
ONSEC.io | 1,839 followers on LinkedIn. Information security audits and penetration testing by a team of experts with an average experience of more than 7 years | ONSEC.io - is a penetration testing & in-depth security audit company with more than 13 years of experience on the market. Our team has already helped more than 300 companies be aware about possible system's vulnerabilities, including Republic, DMarket, LegionFarm, Parallels, Xsolla, Acronis, Manyсhat, Global Fashion Group and others. Our main goal is to increase the customer security level by finding and fixing security issues as well as improve security awareness inside the company, including developers, DevOps, and other teams to build a sustainable engineering culture with security knowledge.