
Staying ahead of cybersecurity threats requires constant vigilance and prompt action. This week brought news of critical vulnerabilities and active attack campaigns that demand attention from security teams and system administrators worldwide.
A significant development involves the discovery and subsequent patching of a dangerous zero-day vulnerability in Adobe ColdFusion. Tracked as CVE-2023-26360, this flaw presents a serious risk, potentially allowing attackers to achieve arbitrary code execution on affected servers. Given the severity, applying the available patch immediately is crucial to prevent exploitation in the wild. Unpatched systems are prime targets for malicious actors looking to compromise sensitive data and infrastructure.
In parallel, the infamous Mirai botnet has resurfaced with a targeted campaign focusing on Wazuh instances running on Linux operating systems. Attackers are actively scanning for and attempting to exploit known vulnerabilities in Wazuh, particularly CVE-2022-42948, to compromise systems and add them to their vast network of compromised devices. This expansion fuels the botnet’s capability to launch powerful Distributed Denial of Service (DDoS) attacks. Organizations utilizing Wazuh must ensure their deployments are fully updated and hardened against these specific threats.
These incidents underscore the dynamic nature of the threat landscape. Proactive patch management and staying informed about the latest vulnerabilities and threat actor tactics are fundamental steps in maintaining a strong security posture and protecting valuable assets.
Source: https://www.helpnetsecurity.com/2025/06/15/week-in-review-microsoft-fixes-exploited-zero-day-mirai-botnets-target-unpatched-wazuh-servers/