Security experts have found two severe vulnerabilities in Kaseya's RapidFire Tools Network Detective, a networking assessment and reporting software extensively used by managed service providers (MSPs) and IT departments. Released on July 10, 2025, the bugs classified as CVE-2025-32353 and CVE-2025-32874 are indicative of serious design flaws in the way the software processes sensitive credentials during their regular scans. The two issues (CVSS 8.2 and CVSS 7.5) relate to the storage of administrative passwords in cleartext in temporary files and the presentation of a weak, predictable encryption scheme that could be reversed using static keys, respectively. Both these bugs can be exploited by malicious actors that have access to a machine where the tool runs, either through physical access, malware, or remote exploitation. Threat actors can steal admin-level credentials with no advanced tools required, opening the doors to lateral movement, privilege escalation, and more extensive compromise of IT infrastructures. Because these threats result from normal tool use and do not involve misconfiguration or tampering, they present a major threat to organizations that depend on Network Detective for compliance and security assurance, such as for standards like HIPAA and PCI. Security professionals recommend impacted organizations assess their exposure and implement mitigations as soon as possible. Suggestions are to remove plaintext password storage, protect credentials with strong hashing algorithms, and not allow sensitive data to be written to disk. Until official patches are released by Kaseya, other security controls need to be put in place around systems executing Network Detective. The attack highlights the paramount necessity of security-by-design in products that manage or scan privileged systems, particularly those integrated into security and compliance processes.
Researchers published a proof-of-concept called Brash that exploits an architectural flaw in Chromium’s Blink rendering engine. By performing unconstrained, high-frequency update...
A sophisticated multilingual phishing campaign has recently been uncovered targeting financial institutions and government organisations across East and Southeast Asia. The attacke...
AzureHound an open-source reconnaissance tool originally intended for red-team operations is being exploited by threat actors to automatically map out Microsoft Entra ID (formerly ...