• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

RondoDox Exploits Unpatched XWiki Servers to Pull Extra Gadgets Into Its Botnet

Admin by Admin
November 17, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Nov 15, 2025Ravie LakshmananMalware / Vulnerability

XWiki Servers

The botnet malware often called RondoDox has been noticed concentrating on unpatched XWiki cases towards a important safety flaw that might permit attackers to attain arbitrary code execution.

The vulnerability in query is CVE-2025-24893 (CVSS rating: 9.8), an eval injection bug that might permit any visitor consumer to carry out arbitrary distant code execution via a request to the “/bin/get/Foremost/SolrSearch” endpoint. It was patched by the maintainers in XWiki 15.10.11, 16.4.1, and 16.5.0RC1 in late February 2025.

Whereas there was proof that the shortcoming had been exploited within the wild since at the least March, it wasn’t till late October, when VulnCheck disclosed it had noticed recent makes an attempt weaponizing the flaw as a part of a two-stage assault chain to deploy a cryptocurrency miner.

CIS Build Kits

Subsequently, the U.S. Cybersecurity and Infrastructure Safety Company (CISA) added the vulnerability to its Identified Exploited Vulnerabilities (KEV) catalog, requiring federal companies to use vital mitigations by November 20.

In a recent report printed Friday, VulnCheck revealed that it has since noticed a spike in exploitation makes an attempt, hitting a brand new excessive on November 7, adopted by one other surge on November 11. This means broader scanning exercise seemingly pushed by a number of menace actors collaborating within the effort.

This consists of RondoDox, a botnet that is quickly including new exploitation vectors to rope vulnerable gadgets right into a botnet for conducting distributed denial-of-service (DDoS) assaults utilizing HTTP, UDP, and TCP protocols. The primary RondoDox exploit was noticed on November 3, 2025, per the cybersecurity firm.

Different assaults have been noticed exploiting the flaw to ship cryptocurrency miners, in addition to makes an attempt to determine a reverse shell and normal probing exercise utilizing a Nuclei template for CVE-2025-24893.

The findings as soon as once more illustrate the necessity for adopting strong patch administration practices to make sure optimum safety.

“CVE-2025-24893 is a well-recognized story: one attacker strikes first, and lots of comply with,” VulnCheck’s Jacob Baines mentioned. “Inside days of the preliminary exploitation, we noticed botnets, miners, and opportunistic scanners all adopting the identical vulnerability.”

Tags: BotnetDevicesExploitsPullRondoDoxServersUnpatchedXWiki
Admin

Admin

Next Post
These applied sciences may assist put a cease to animal testing

These applied sciences may assist put a cease to animal testing

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Guided studying lets “untrainable” neural networks notice their potential | MIT Information

Guided studying lets “untrainable” neural networks notice their potential | MIT Information

December 19, 2025
This benchmark used Reddit’s AITA to check how a lot AI fashions suck as much as us

This benchmark used Reddit’s AITA to check how a lot AI fashions suck as much as us

May 30, 2025

Trending.

10 tricks to begin getting ready! • Yoast

10 tricks to begin getting ready! • Yoast

July 21, 2025
AI-Assisted Menace Actor Compromises 600+ FortiGate Gadgets in 55 Nations

AI-Assisted Menace Actor Compromises 600+ FortiGate Gadgets in 55 Nations

February 23, 2026
Exporting a Material Simulation from Blender to an Interactive Three.js Scene

Exporting a Material Simulation from Blender to an Interactive Three.js Scene

August 20, 2025
Moonshot AI Releases 𝑨𝒕𝒕𝒆𝒏𝒕𝒊𝒐𝒏 𝑹𝒆𝒔𝒊𝒅𝒖𝒂𝒍𝒔 to Exchange Mounted Residual Mixing with Depth-Sensible Consideration for Higher Scaling in Transformers

Moonshot AI Releases 𝑨𝒕𝒕𝒆𝒏𝒕𝒊𝒐𝒏 𝑹𝒆𝒔𝒊𝒅𝒖𝒂𝒍𝒔 to Exchange Mounted Residual Mixing with Depth-Sensible Consideration for Higher Scaling in Transformers

March 16, 2026
Introducing Sophos Endpoint for Legacy Platforms – Sophos Information

Introducing Sophos Endpoint for Legacy Platforms – Sophos Information

August 28, 2025

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

Cloud storage safety finest practices

Cloud storage safety finest practices

March 19, 2026
Which E-mail Platform Wins in 2026?

Which E-mail Platform Wins in 2026?

March 18, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved