HomeCII/OTMITRE Caldera: CVE-2025-27364 Critical Remote Code Execution Vulnerability

MITRE Caldera: CVE-2025-27364 Critical Remote Code Execution Vulnerability

Published on

spot_img

A critical Remote Code Execution (RCE) vulnerability, known as CVE-2025-27364, has been uncovered in MITRE Caldera, an open-source adversary emulation platform widely used by cybersecurity professionals. This vulnerability poses a severe risk as it could potentially allow malicious actors to execute arbitrary code on the server where Caldera is deployed, ultimately compromising sensitive systems and data.

MITRE Caldera serves as a robust platform for simulating cyberattacks within a controlled environment, particularly focusing on emulating advanced persistent threats (APTs) by deploying agents to carry out various cyber operations. These agents, such as Sandcat and Manx, are instrumental in emulating adversarial tactics by executing commands remotely. The platform utilizes a command-and-control (C2) server API to compile and deploy these agents to target systems.

CVE-2025-27364 specifically targets the dynamic agent compilation functionality in versions 4.2.0 and earlier of MITRE Caldera, affecting the compilation and download process of Sandcat and Manx agents. Exploiting this vulnerability involves manipulating web requests directed at the Caldera server API to execute arbitrary code on the server, which falls under the category of a Remote Code Execution (RCE) vulnerability.

The vulnerability stems from the lack of proper input sanitization in the Caldera server’s dynamic compilation process. Attackers can exploit this flaw by manipulating linker flags, particularly the -extldflags option, used during agent compilation with the gcc tool. By injecting malicious commands through these flags, attackers can potentially execute arbitrary code on the server, posing a significant security risk.

To trigger the vulnerability, attackers interact with the gcc tool during the compilation process and control aspects of execution, such as specifying external linkers and appended flags. This manipulation enables attackers to execute arbitrary binaries under their control, potentially leading to the compromise of the Caldera server process.

The severity of CVE-2025-27364 is underscored by its critical rating and a CVSS score of 10.0, indicating a high level of risk. The widespread availability of the vulnerability across Caldera’s default configurations makes it highly exploitable, especially given the common use of GCC as a dependency. MITRE Caldera has advised users to immediately patch their systems by upgrading to version 5.1.0 or later to mitigate the risk posed by this vulnerability.

If left unaddressed, CVE-2025-27364 could empower attackers to gain full control over Caldera servers, potentially leading to data breaches, backdoor installations, and advanced exploitation. Timely patching and adherence to security best practices are paramount to safeguard against such vulnerabilities and mitigate cyber threats effectively. The swift response of the MITRE Caldera team in addressing this vulnerability underscores the importance of proactive security measures in the face of evolving cyber risks.

Source link

Latest articles

NCSC Urges Immediate Patching of F5 BIG-IP Vulnerability

Urgent Call to Action for UK Organizations to Address Critical F5 Vulnerability In light of...

Infrastructure Engineer Admits Guilt in Locking 254 Windows Servers at Previous Employer

On April 1, 2026, Daniel Rhyne, a 59-year-old former core infrastructure engineer, faced federal...

Impact of Data Centers as Military Targets

Rethinking Business Continuity Plans: A Pressing Need for CIOs Amid Cloud Resilience Challenges Contextualizing Recent...

12 Cyber Industry Trends Unveiled at RSAC 2026

Reflections on RSA 2026: A Transformative Event in Cybersecurity As the curtains draw on the...

More like this

NCSC Urges Immediate Patching of F5 BIG-IP Vulnerability

Urgent Call to Action for UK Organizations to Address Critical F5 Vulnerability In light of...

Infrastructure Engineer Admits Guilt in Locking 254 Windows Servers at Previous Employer

On April 1, 2026, Daniel Rhyne, a 59-year-old former core infrastructure engineer, faced federal...

Impact of Data Centers as Military Targets

Rethinking Business Continuity Plans: A Pressing Need for CIOs Amid Cloud Resilience Challenges Contextualizing Recent...