In this week's Security Advisory:
Oracle released patches for three hundred and eighteen vulnerabilities in multiple products on Tuesday. One hundred and eighty (180) of these can be exploited remotely without authentication. A total of 30 were critical severity vulnerabilities. The most severe of all the vulnerabilities is CVE-2025-21556 (CVSS 9.9/10) which affects Agile Product Lifecycle Management by allowing an attacker to seize control over vulnerable instances.
Affected Versions
More Reading/Information
A high-severity 7-zip vulnerability, CVE-2025-0411 (CVSS 7/10), was released over the weekend. The vulnerability allows an attacker to bypass the Windows Mark of the Web Security feature, which is designed to identify files downloaded from unverified sources and flag them to restrict execution. By bypassing this feature, users would not be warned that a file extracted from 7-zip is malicious, and an attacker would be able to remotely execute code on the user's device.
Affected Versions
More Reading/Information
SimpleHelp is a remote support software that allows an IT staff to remotely access user workstations without the user's interactions. The most critical vulnerability CVE-2024-57726 (CVSS 9.9/10), allows an attacker with technician access to elevate themselves to an admin role. These attackers can then interact with user machines if unattended access is configured. Two other high-severity vulnerabilities were also fixed in the released patch, CVE-2024-57727 (CVSS 7.5/10) and CVE-2024-57728 (CVSS 7.2/10).
Affected Versions
More Reading/Information
Zoom has released updates for its workplace apps and Jenkins plugins. The highest severity vulnerability, CVE-2025-0147 (CVSS 8.8/10) affects the Workplace app for Linux. The vulnerability allows an authorized user to escalate their privileges via network access. The bulletin also has three (3) medium and two (2) low-severity vulnerabilities as well.
Affected Versions
More Reading/Information
Please review your environment to ensure the above-mentioned issues are patched in a timely manner. It is security best practice to regularly update and/or patch software to the latest versions. The vulnerabilities above highlight the security benefits of limiting deployed software to "vendor-supported versions" only. This dramatically increases the likelihood that new vulnerabilities have a patch issued for them. Likewise, Cybersafe strongly encourages maintaining an inventory of current software in your environment, which helps ensure and inform your patch and vulnerability management program.