Critical Apache bRPC Vulnerability Allows Remote Command Injection (CVE-2025-60021)

Critical Apache bRPC Vulnerability Allows Remote Command Injection (CVE-2025-60021)

A critical remote command injection vulnerability has been discovered in Apache bRPC, with over 4,000 exposed instances identified online.

Vulnerability Details

CVE IDCVSS ScoreTypeAffected Versions
CVE-2025-600219.8 (Critical)Remote Command InjectionAll versions prior to 1.15.0

The flaw exists in the heap profiler's extra_options parameter. Attackers can exploit the /pprof/heap service to execute arbitrary commands on vulnerable systems without authentication.

Exposure

ZoomEye scans indicate approximately 4,000+ internet-facing bRPC instances, creating significant attack surface for exploitation.

Remediation

Organizations running Apache bRPC should upgrade to version 1.15.0 or later immediately.

As a temporary mitigation, restrict access to the /pprof/heap endpoint and ensure bRPC services are not exposed to the internet.

Read more

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

Elastic Security Labs has disclosed a new ClickFix campaign that leverages compromised legitimate websites as delivery infrastructure to deploy a previously undocumented remote access trojan dubbed MIMICRAT (also tracked as AstarionRAT). The campaign, discovered earlier this month, demonstrates significant operational sophistication — from multi-stage PowerShell chains that bypass Windows security controls

By Zero Day Wire
ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

A new wave of attacks is combining voice phishing (vishing) with OAuth 2.0 device authorization abuse to compromise Microsoft Entra accounts at technology, manufacturing, and financial organizations — bypassing traditional phishing infrastructure entirely. Sources told BleepingComputer they believe the ShinyHunters extortion gang is behind the campaigns, which the threat actors

By Zero Day Wire