❌

Normal view

Received β€” 12 March 2026 ⏭ /r/netsec - Information Security News & Discussion

CVE-2026-21509: Actively Exploited Microsoft Office Security Feature Bypass β€” PoC Public, CISA KEV Listed

A high-severity (CVSS 7.8) security feature bypass in Microsoft Office is being actively exploited in the wild, with a public PoC already available and the vuln now on CISA's KEV catalog. Root cause is unvalidated input handling (CWE-807) that allows malicious OLE/COM objects in crafted documents to bypass built-in protections. Attack vector is local with no privileges required β€” just a user opening a phishing-delivered Office file. Affects Office 2016, 2019, LTSC 2021/2024, and Microsoft 365 Apps on x86/x64. Microsoft dropped an out-of-band emergency patch on January 26, 2026. Office 2016/2019 also require a registry-based mitigation. Confirmed targeting of government agencies, critical infrastructure, and maritime/transport sectors.

submitted by /u/Sarah_Cross
[link] [comments]

MicroStealer Analysis: A Fast-Spreading Infostealer with Limited Detection

  • MicroStealer exposes a broader business risk by stealing browser credentials, active sessions, and other sensitive data tied to corporate access.
  • The malware uses a layered NSIS β†’ Electron β†’ JAR chain that helps it stay unclear longer and slows confident detection.
  • Distribution through compromised or impersonated accounts makes the initial infection look more trustworthy to victims.
submitted by /u/malwaredetector
[link] [comments]

Alipay (1B+ users) DeepLink+JSBridge Attack Chain: Silent GPS Exfiltration, 6 CVEs (CVSS 9.3)

Update (March 13, 2026):

Several major developments since this was posted:

  1. Packet Storm Security β€” Advisory published: https://packetstorm.news/files/id/217089

  2. Apple Product Security β€” Confirmed forwarding to investigation team (Ticket OE01052449093014). Apple is actively investigating Alipay iOS app.

  3. Google Play β€” Policy violation investigation confirmed (Case #9-7515000040640).

  4. Singapore PDPC β€” Formal investigation opened (Case #00629724).

  5. HKCERT β€” Forwarded report to CNCERT (China National CERT).

  6. MITRE CVE β€” 6 CVEs pending (Ticket #2005801), CVSS 7.4–9.3.

Vendor (Ant Group) continues to maintain these are "normal functionality" and has issued no patch.

Full report: https://innora.ai/zfb/

submitted by /u/feng_sg
[link] [comments]
Received β€” 11 March 2026 ⏭ /r/netsec - Information Security News & Discussion

New UNISOC RCE!!

A critical vulnerability in UNISOC modem firmware allows one User Equipment (UE) to remotely attack another over the cellular network. By sending specially crafted malformed SDP within SIP signaling messages, an attacker can trigger memory corruption in the target modem, potentially leading to remote execution of arbitrary native code on the victim device.

submitted by /u/SSDisclosure
[link] [comments]

CVE-2026-28292: RCE in simple-git via case-sensitivity bypass (CVSS 9.8)

[research writeup](https://www.codeant.ai/security-research/security-research-simple-git-remote-code-execution-cve-2026-28292)

simple-git, 5M+ weekly npm downloads. the bypass is through case-sensitivity handling, subtle enough that traditional SAST wouldn't catch it.

found by the same team (codeant ai) that found CVE-2026-29000, the CVSS 10.0 pac4j-jwt auth bypass that sat undiscovered for 6 years.

interesting pattern: both vulns were found by AI code reviewer, not pattern-matching scanners.

submitted by /u/WatugotOfficial
[link] [comments]

CVE-2026-26117: Hijacking Azure Arc on Windows for Local Privilege Escalation & Cloud Identity Takeover

We’ve disclosed CVE-2026-26117 affecting Azure Arc on Windows: a high severity local privilege escalation that can also be used to take over the machine’s cloud identity.

In practical terms, this means a low-privileged user on an Arc-joined Windows host may be able to escalate to higher privileges and then abuse the Arc identity context to pivot into Azure.

If you’re running Azure Arc–joined Windows machines and your Arc Agent services are below v1.61, assume you’re impacted update to v1.61.

submitted by /u/Fun_Preference1113
[link] [comments]

Classifying email providers of 2000+ Swiss municipalities via DNS, looking for feedback on methodology

I built a pipeline and map that classifies where Swiss municipalities host their email by probing public DNS records. I wanted to find out how much uses MS365 or other US clouds, based on public data:

screenshot of map

The classification uses a hierarchical decision tree:

  1. MX record keyword matching (highest priority) β€” direct hostname patterns for Microsoft 365 (mail.protection.outlook.com), Google Workspace (aspmx.l.google.com), AWS SES, Infomaniak (Swiss provider)
  2. CNAME chain resolution on MX hostnames β€” follows aliases to detect providers hidden behind vanity hostnames
  3. Gateway detection β€” identifies security appliances (e.g. Trend Micro etc.) by MX hostname, then falls through to SPF to identify the actual backend provider
  4. Recursive SPF resolution β€” follows include: and redirect= chains (with loop detection, max 10 lookups) to expand the full SPF tree and match provider keywords
  5. ASN lookup via Team Cymru DNS β€” maps MX server IPs to autonomous systems to detect Swiss ISP relay hosting (SWITCH, Swisscom, Sunrise, etc.). For these, autodiscover is checked to see if a hyperscaler is actually behind the relay.
  6. Autodiscover probing (CNAME + _autodiscover._tcp SRV) β€” fallback to detect hidden Microsoft 365 usage behind self-hosted or ISP-relayed MX
  7. Website scraping as last resort β€” probes /kontakt, /contact, /impressum pages, extracts email addresses (including decrypting TYPO3 obfuscated mailto links), then classifies the email domain's infrastructure

Key design decisions:

  • MX takes precedence over SPF
  • Gateway + SPF expansion is critical β€” many municipalities use security appliances that mask the real provider
  • Three independent DNS resolvers (system, Google, Cloudflare) for resilience
  • Confidence scoring (0–100) with quality gates (avg β‰₯70, β‰₯80% high-confidence)

Results land in 7 categories: microsoft, google, aws, infomaniak, swiss-isp, self-hosted, unknown.

Where I'd especially appreciate feedback:

  • Do you think this a good approach?
  • Are there MX/SPF patterns I'm missing for common provider setups?
  • Edge cases where gateway detection could misattribute the backend?
  • Are there better heuristics than autodiscover for detecting hyperscaler usage behind ISP relays?
  • Would you rather introduce a new category "uncertain" instead, if so for which cases?

Thanks!

submitted by /u/dfhsr
[link] [comments]
Received β€” 10 March 2026 ⏭ /r/netsec - Information Security News & Discussion

Electric Eye – a Rust/WASM Firefox extension to detect AitM proxies via DOM analysis, TLS fingerprinting and HTTP header inspection

I built a Firefox extension to detect Adversary-in-the-Middle attacks in real time.

The core idea: instead of chasing blacklists (a losing game when domains cost $3),

look at what the proxy cannot easily hide.

Detection runs across four layers:

- DNS: entropy, punycode/homograph, typosquatting, subdomain anomalies

- HTTP headers: missing CSP/HSTS, proxy header signatures

- TLS: certificate age anomalies

- DOM: MutationObserver scanning for domain mismatch between the current URL

and page content β€” this is the killer signal against Evilginx-style kits

The engine is pure Rust compiled to WASM. JS is a deliberately thin interface

layer only β€” a conscious security decision.

Tested against a live Evilginx deployment: 1.00 CRITICAL. Zero false positives

on 10+ legitimate sites including Google, Apple, PayPal, and several EU banks.

There is a grey area β€” CDN-heavy sites (Amazon, PayPal) trigger ProxyHeaderDetected

via CloudFront. Still working on a neater model for that.

Full writeup: https://bytearchitect.io/network-security/Bypassing-MFA-with-Reverse-Proxies-Building-a-Rust-based-Firefox-Extension-to-Kill-AitM-Phishing/

Submitted to Mozilla Add-ons β€” pending review. Happy to discuss the detection

model or the Rust/WASM architecture.

submitted by /u/Reversed-Engineer-01
[link] [comments]

Sign in with ANY password into Rocket.Chat EE (CVE-2026-28514) and other vulnerabilities we’ve found with our open source AI framework

Hey! I’m one of the authors of this blog post. We (the GitHub Security Lab) developed an open-source AI-framework that supports security researchers in discovering vulnerabilities. In this blog post we show how it works and talk about the vulnerabilities we were able to find using it.

submitted by /u/ulldma
[link] [comments]
Received β€” 9 March 2026 ⏭ /r/netsec - Information Security News & Discussion

Unpinched - Instant point-in-time detection of PinchTab and agentic browser bridge artifacts.

Didn't expect this, Helixar_ai published a free scanner for PinchTab, the agentic stealth browser tool your EDR can't see.

unpinched scan

Useful if you're running AI agents anywhere near a browser.

submitted by /u/dalugoda
[link] [comments]
❌