HomeCII/OTMITRE Caldera remote code execution vulnerability publicly exploited, patch immediately! (CVE-2025-27364)

MITRE Caldera remote code execution vulnerability publicly exploited, patch immediately! (CVE-2025-27364)

Published on

spot_img

MITRE Caldera cyber security platform users are being warned to patch a critical vulnerability (CVE-2025–27364) that could potentially allow remote code execution by unauthenticated attackers. The vulnerability, affecting all versions of MITRE Caldera up to 4.2.0 and 5.0.0, was identified and reported by Dawid Kulikowski, a contributor to the project who also assisted in developing a patch for it.

The vulnerability is centered around the dynamic compilation functionality of the Caldera Manx and Sandcat agents (implants). This flaw enables remote attackers to execute arbitrary code on the server where Caldera is deployed by sending a malicious HTTPS request to the Caldera server API responsible for compiling and retrieving the specified agents.

To successfully exploit the vulnerability, certain conditions must be met. The system hosting the Caldera server must have Go(Lang), Python, and GNU Compiler Collection (GCC) installed. However, these dependencies are typically essential for the proper functioning of Caldera. The presence of GCC as a dependency of Go on many distributions also increases the likelihood of this vulnerability being accessible to attackers.

The MITRE Caldera team has taken action to address the issue by releasing a fix in version 5.1.0. Additionally, Kulikowski will be releasing a Metasploit module targeting the vulnerability in the coming weeks. As a precautionary measure, users are advised to promptly update their instances to the latest version or restrict access to them from the internet.

Despite modifying the proof-of-exploit (PoC) code to prevent misuse by inexperienced individuals, more experienced exploit developers can potentially adapt it by scrutinizing Caldera’s source code. This underlines the importance of swift mitigation to prevent the exploitation of CVE-2025–27364.

In conclusion, cybersecurity professionals utilizing MITRE Caldera should prioritize applying the necessary patch to mitigate the remote code execution vulnerability. Stay informed and vigilant to protect your systems and data from potential threats.

Source link

Latest articles

Drift Loses $285 Million in DPRK-Linked Social Engineering Attack

  What Happened Solana-based decentralized exchange Drift confirmed that attackers drained approximately $285 million from...

Cyber Briefing – April 3, 2026 – CyberMaterial

Cybersecurity Updates: Key Developments and Alerts In the latest surge of incidents reported within the...

NCSC Urges Immediate Patching of F5 BIG-IP Vulnerability

Urgent Call to Action for UK Organizations to Address Critical F5 Vulnerability In light of...

Infrastructure Engineer Admits Guilt in Locking 254 Windows Servers at Previous Employer

On April 1, 2026, Daniel Rhyne, a 59-year-old former core infrastructure engineer, faced federal...

More like this

Drift Loses $285 Million in DPRK-Linked Social Engineering Attack

  What Happened Solana-based decentralized exchange Drift confirmed that attackers drained approximately $285 million from...

Cyber Briefing – April 3, 2026 – CyberMaterial

Cybersecurity Updates: Key Developments and Alerts In the latest surge of incidents reported within the...

NCSC Urges Immediate Patching of F5 BIG-IP Vulnerability

Urgent Call to Action for UK Organizations to Address Critical F5 Vulnerability In light of...