The Shadowserver Foundation

Our mission is to make the Internet more secure by bringing to light vulnerabilities, malicious activity and emerging threats. Join our Alliance!

The Shadowserver Foundationshadowserver@infosec.exchange
2025-05-19

We are also scanning for Ivanti EPMM instances likely vulnerable (unpatched) to CVE-2025-4427 which can be chained with CVE-2025-4428 for RCE.

First scans found 940 instances (2025-05-15), down to 798 (2025-05-18).

Geo breakdown: dashboard.shadowserver.org/sta

IP data in shadowserver.org/what-we-do/ne tagged as 'cve-2025-4427'.

Detection is based on non-intrusive check provided by @watchtowrcyber

CVE-2025-4427 tracker: dashboard.shadowserver.org/sta

If you receive an alert, please make sure to review for any compromise - CVE-2025-4427/CVE-2025-4428 are exploited in the wild.

Patch info from Ivanti: forums.ivanti.com/s/article/Se

Background on vulnerabilities:
labs.watchtowr.com/expression-

The Shadowserver Foundationshadowserver@infosec.exchange
2025-05-12

We’re excited to announce that CERT.LV (National CSIRT of Latvia) has joined the Shadowserver Alliance as a Bronze Tier Partner!

Together we will raise the bar on cybersecurity.

Read more about CERT.LV: cert.lv/en/

Become a Shadowserver Alliance partner today: shadowserver.org/partner/

The Shadowserver Foundationshadowserver@infosec.exchange
2025-05-07

We are sharing SysAid instances likely vulnerable to CVE-2025-2775, CVE-2025-2776, CVE-2025-2777 (XXEs) any of which combined with CVE-2025-2778 allows for RCE.

77 IPs found unpatched so far (version check).

Install updates from SysAid (from March!) documentation.sysaid.com/docs/

IP data for your network shared in our Accessible HTTP shadowserver.org/what-we-do/ne & Accessible SSL shadowserver.org/what-we-do/ne reports with 'sysaid-vulnerable' tag.

Starting tomorrow data will be in our Vulnerable HTTP report with 'cve-2025-2775' tag shadowserver.org/what-we-do/ne

We would like to thank
@watchtowrcyber for the collaboration!

Background: labs.watchtowr.com/sysowned-yo

The Shadowserver Foundationshadowserver@infosec.exchange
2025-05-07

Check out our latest Dashboard updates that now highlight compromised devices & post-exploitation frameworks/C2s discovered in scans, as well as various functionality improvements:

dashboard.shadowserver.org/#co

dashboard.shadowserver.org/#po

A big thank you to the UK Foreign, Commonwealth & Development Office for the funding that enabled the work.

As a reminder we have 76 languages supported!

The Shadowserver Foundationshadowserver@infosec.exchange
2025-04-15

We’re excited to announce that Identity Digital has joined the Shadowserver Alliance as a Bronze Tier Partner!

Together we will work to make the Internet safer and more secure.

Read more about Identity Digital:

identity.digital/company

Become a Shadowserver Alliance partner today:

shadowserver.org/partner

The Shadowserver Foundationshadowserver@infosec.exchange
2025-04-07

Ivanti Connect Secure CVE-2025-22457 (stack-based buffer overflow allowing for unauth RCE): we see over 5113 instances unpatched in our scan for 2025-04-06. This vulnerability has been observed exploited in the wild and is on US CISA KEV.

World Map: dashboard.shadowserver.org/sta

IP data shared in our Vulnerable HTTP report tagged 'cve-2025-22457'. As part of work on tagging this vuln, we improved our fingerprinting of Ivanti Connect Secure with a little help from some friends!

shadowserver.org/what-we-do/ne

CVE-2025-22457 tracker: dashboard.shadowserver.org/sta

Ivanti advisory and patch info: forums.ivanti.com/s/article/Ap

Note that according to Ivanti, the vulnerability was patched in a Feb 11, 2025 release. However, a large set of what is affected are older Pulse Connect Secure 9.x (end-of-support as of December 31), without a patch.

The Shadowserver Foundationshadowserver@infosec.exchange
2025-03-31

We are observing CrushFTP CVE-2025-2825 exploitation attempts based on publicly available PoC exploit code. You can track attempts on our Dashboard at dashboard.shadowserver.org/sta

Still 1512 unpatched instances vulnerable to CVE-2025-2825 seen on 2025-03-30

dashboard.shadowserver.org/sta

CrushFTP versions 10.0.0 through 10.8.3 and 11.0.0 through 11.3.0 are affected. Make sure to check for signs of compromise and update: crushftp.com/crush11wiki/Wiki.

The Shadowserver Foundationshadowserver@infosec.exchange
2025-03-28

We are sharing unpatched CrushFTP instances likely vulnerable to CVE-2025-2825 (CVSS 9.8) that may allow unauthenticated remote attackers to bypass authentication via HTTP(S) requests. We see ~1800 unpatched instances worldwide, with over 900 in the US.

World map of vulnerable instances: dashboard.shadowserver.org/sta

IP data shared in our Vulnerable HTTP report, tagged 'cve-2025-2825': shadowserver.org/what-we-do/ne

CrushFTP versions 10.0.0 through 10.8.3 and 11.0.0 through 11.3.0 are affected. Make sure to update: crushftp.com/crush11wiki/Wiki.

Tree map geo breakdown: dashboard.shadowserver.org/sta

CVE-2025-2825 tracker: dashboard.shadowserver.org/sta

Switch on automatic updates if possible

The Shadowserver Foundationshadowserver@infosec.exchange
2025-03-27

For the last few days we are also scanning & reporting out exposed Ingress NGINX Controller for Kubernetes (Admission Controller feature). These may possibly be also vulnerable to CVE-2025-1974 & other recently disclosed vulnerabilities.

We see around 4000 IPs exposed.

Data is shared in the Vulnerable HTTP report & tagged as `possible-cve-2025-1974`. Note that the validating Admission Controller should not be exposed to the Internet regardless of any additional vulnerabilities! We also report these out in our Device Identification report.

Vulnerable HTTP report: shadowserver.org/what-we-do/ne

Device Identification (device model is set to Kubernetes Admission Controller): shadowserver.org/what-we-do/ne

Dashboard tree map view: dashboard.shadowserver.org/sta

Dashboard tracker:
dashboard.shadowserver.org/sta

Patch info: kubernetes.io/blog/2025/03/24/

Background: wiz.io/blog/ingress-nginx-kube

The Shadowserver Foundationshadowserver@infosec.exchange
2025-03-19

We are excited to welcome Arctic Security @arcticsecurity to the Shadowserver Alliance (Silver tier)!

We look forward to this partnership to raise the bar on cybersecurity.

Learn more about Arctic Security: arcticsecurity.com

Become a Shadowserver Alliance Partner today: shadowserver.org/partner/

The Shadowserver Foundationshadowserver@infosec.exchange
2025-03-05

We are scanning & reporting out VMware ESXi CVE-2025-22224 vulnerable instances ("a malicious actor with local admin privileges on a virtual machine may exploit this to execute code as virtual machine's VMX process running on host").

Nearly 41.5K found vulnerable on 2025-03-04.

IP data shared in our Vulnerable HTTP report, tagged 'cve-2025-22224' : shadowserver.org/what-we-do/ne

Dashboard tree map breakdown: dashboard.shadowserver.org/sta

Track patching progress here: dashboard.shadowserver.org/sta

This vulnerability is known to be exploited in the wild and on @cisacyber KEV list: cisa.gov/known-exploited-vulne

Patch info from Broadcom: support.broadcom.com/web/ecx/s

The Shadowserver Foundationshadowserver@infosec.exchange
2025-03-04

We started scanning for IoT devices compromised by the Eleven11bot DDoS botnet, with ~86.4K discovered on 2025-03-03. IP data is shared daily in our Compromised IoT report shadowserver.org/what-we-do/ne

Top affected: US (24.7K), UK (10.8K).

Dashboard map view: dashboard.shadowserver.org/sta

For background, please see Nokia Deepfield Emergency Response Team (ERT) @deepfield announcement: infosec.exchange/@deepfield/11

Dashboard breakdown by US state:

dashboard.shadowserver.org/sta

The Shadowserver Foundationshadowserver@infosec.exchange
2025-02-27

We are scanning for & reporting Nakivo Backup & Replication CVE-2024-48248 (arbitrary file read) vulnerable instances in our Vulnerable HTTP report: shadowserver.org/what-we-do/ne.

~208 vulnerable instances seen 2025-02-26

Dashboard map view: dashboard.shadowserver.org/sta

Data is tagged 'vulnerable-nakivo-backup' since 2025-02-13 thanks to @watchtowrcyber
We have also added the 'cve-2024-48248' tag as well today.

If you run Nakivo, make sure to update your instance to the latest version! (vulnerability was silently patched 2024-11-04).

For an in-depth analysis of the vulnerability, please read the @watchtowrcyber blog at labs.watchtowr.com/the-best-se

The Shadowserver Foundationshadowserver@infosec.exchange
2025-02-25

We started scanning & reporting out Ivanti Connect Secure CVE-2025-22467 vulnerable (unpatched) instances in our daily feeds. ~2850 IP seen unpatched worldwide in our daily scans.

Top affected: US (852) & Japan (384)

Dashboard world map view: dashboard.shadowserver.org/sta

CVE-2025-22467 is stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6 allows a remote authenticated attacker to achieve remote code execution.

This is a version based check.

See advisory from Ivanti on this & other vulns: forums.ivanti.com/s/article/Fe

We share IP level data on CVE-2025-22467 in our Vulnerable HTTP report for your network/constituency: shadowserver.org/what-we-do/ne

Not receiving our free daily feeds? Subscribe here: shadowserver.org/what-we-do/ne

The Shadowserver Foundationshadowserver@infosec.exchange
2025-02-24

At last week’s UN #OEWG on ICT,
@shadowserver and
@globalcyberalliance represented
@commongoodcyber on a panel discussing “Cybersecurity for the Common Good: Strengthening Nonprofits Engagement in a Permanent UN Mechanism on ICT Security” hosted by @EU_ISS

Read more about Common Good Cyber: commongoodcyber.org

The Shadowserver Foundationshadowserver@infosec.exchange
2025-02-21

@WACREN We are excited to collaborate with WACREN
and Deutsche Gesellschaft für Internationale Zusammenarbeit (GIZ) GmbH on our joint project to strengthen the cyber resilience, situational awareness and incident response of the West African research & education sector!

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst