A critical vulnerability has been discovered in Akka.NET’s Akka.Remote module, identified as CVE-2025-61778 and rated CVSSv4 9.3 (Critical). This flaw affects versions v1.2.0 through v1.5.51 and has been resolved in v1.5.52. The issue stems from a gap in the TLS handshake process, where Akka.Remote failed to enforce mutual certificate-based authentication. While TLS could be enabled via akka.remote.dot-netty.tcp, only server-side private key validation was performed, leaving outbound clients unchecked and allowing untrusted systems to connect without presenting valid certificates. This oversight meant attackers could impersonate legitimate nodes and infiltrate TLS-protected clusters, potentially exchanging messages and manipulating inter-node communication. The Akka.NET team emphasized that mutual TLS (mTLS) was not properly implemented prior to v1.5.52, which is essential for securing distributed systems. Although deployments within private, controlled networks or those not using TLS are unaffected, any system relying on TLS—especially cloud-exposed or multi-node clusters—is highly vulnerable. To address the flaw, Akka.NET maintainers released two key patches. Patch #7847 introduces “fail fast” behavior, terminating systems immediately if TLS is enabled but the private key is missing or invalid. Patch #7851 enforces mTLS by default, requiring both client and server to present and validate certificates during the handshake. These fixes are included in Akka.NET v1.5.52 and are crucial for securing communication between cluster members. Given Akka.NET’s widespread adoption across financial services, IoT, and streaming platforms—with nearly 19 million downloads—the potential impact is significant. Users relying on TLS for security are strongly urged to upgrade to v1.5.52 or later to prevent unauthorized access and ensure robust authentication across their distributed systems.
Phoenix Contact this week released firmware updates for its QUINT4 uninterruptible power supply (UPS) EtherNet/IP product line to address five vulnerabilities disclosed by CyberDan...
Microsoft has released a critical security update to address what is being described as the most severe vulnerability ever discovered in ASP.NET Core. The flaw, identified as CVE-2...
ConnectWise has issued a major patch to its Automate platform (version 2025.9) to remediate severe security vulnerabilities that could compromise software upgrades. They were found...