Breaking
April 19, 2025

This Week in Security: No More CVEs, 4chan, and Recall Returns Jonathan Bennett | usagoldmines.com

The sky is falling. Or more specifically, it was about to fall, according to the security community this week. The MITRE Corporation came within a hair’s breadth of running out of its contract to maintain the CVE database. And admittedly, it would be a bad thing if we suddenly lost updates to the central CVE database. What’s particularly interesting is how we knew about this possibility at all. An April 15 letter sent to the CVE board warned that the specific contract that funds MITRE’s CVE and CWE work was due to expire on the 16th. This was not an official release, and it’s not clear exactly how this document was leaked.

Many people made political hay out of the apparent imminent carnage. And while there’s always an element of political maneuvering when it comes to contract renewal, it’s worth noting that it’s not unheard of for MITRE’s CVE funding to go down to the wire like this. We don’t know how many times we’ve been in this position in years past. Regardless, MITRE has spun out another non-profit, The CVE Foundation, specifically to see to the continuation of the CVE database. And at the last possible moment, CISA has announced that it has invoked an option in the existing contract, funding MITRE’s CVE work for another 11 months.

Android Automatic Reboots

Mobile devices are in their most secure state right after boot, before the user password is entered to unlock the device for the first time. Tools like Cellebrite will often work once a device has been unlocked once, but just can’t exploit a device in the first booted state. This is why Google is rolling out a feature, where Android devices that haven’t been unlocked for three days will automatically reboot.

Once a phone is unlocked, the encryption keys are stored in memory, and it only takes a lock screen bypass to have full access to the device. But before the initial unlock, the device is still encrypted, and the keys are safely stored in the hardware security module. It’s interesting that this new feature isn’t delivered as an Android OS update, but as part of the Google Play Services — the closed source libraries that run on official Android phones.

4chan

4chan has been hacked. It turns out, running ancient PHP code and out-of-date libraries on a controversial site is not a great idea. A likely exploit chain has been described, though this should be considered very unofficial at this point: Some 4chan boards allow PDF uploads, but the server didn’t properly vet those files. A PostScript file can be uploaded instead of a PDF, and an old version of Ghostscript processes it. The malicious PostScript file triggers arbitrary code execution in Ghostscript, and a SUID binary is used to elevate privileges to root.

PHP source code of the site has been leaked, and the site is still down as of the time of writing. It’s unclear how long restoration will take. Part of the fallout from this attack is the capture and release of internal discussions, pictures of the administrative tools, and even email addresses from the site’s administration.

Recall is Back

Microsoft is back at it, working to release Recall in a future Windows 11 update. You may remember our coverage of this, castigating the security failings, and pointing out that Recall managed to come across as creepy. Microsoft wisely pulled the project before rolling it out as a full release.

If you’re not familiar with the Recall concept, it’s the automated screenshotting of your Windows machine every few seconds. The screenshots are then locally indexed with an LLM, allowing for future queries to be run against the data. And once the early reviewers got over the creepy factor, it turns out that’s genuinely useful sometimes.

On top of the security hardening Microsoft has already done, this iteration of Recall is an opt-in service, with an easy pause button to temporarily disable the snapshot captures. This is definitely an improvement. Critics are still sounding the alarm, but for a much narrower problem: Recall’s snapshots will automatically extract information from security focused applications. Think about Signal’s disappearing messages feature. If you send such a message to a desktop user, that has Recall enabled, the message is likely stored in that user’s Recall database.

It seems that Microsoft has done a reasonably good job of cleaning up the Recall feature, particularly by disabling it by default. It seems like the privacy issues could be furthered addressed by giving applications and even web pages a way to opt out of Recall captures, so private messages and data aren’t accidentally captured. As Recall rolls out, do keep in mind the potential extra risks.

16,000 Symlinks

It’s been recently discovered that over 16,000 Fortinet devices are compromised with a trivial backdoor, in the form of a symlink making the root filesystem available inside the web-accessible language folder. This technique is limited to devices that have the SSL VPN enabled. That system exposes a web interface, with multiple translation options. Those translation files live in a world-accessible folder on the web interface, and it makes for the perfect place to hide a backdoor like this one. It’s not a new attack, and Fortinet believes the exploited devices have harbored this backdoor since the 2023-2024 hacking spree.

Vibes

We’re a little skeptical on the whole vibe coding thing. Our own [Tyler August] covered one of the reasons why. LLMs are likely to hallucinate package names, and vibe coders may not check closely, leading to easy typosquatting (LLMsquatting?) attacks. Figure out the likely hallucinated names, register those packages, and profit.

But what about Vibe Detections? OK, we know, letting an LLM look at system logs for potentially malicious behavior isn’t a new idea. But [Claudio Contin] demonstrates just how easy it can be, with the new EDV tool. Formally not for production use, this new gadget makes it easy to take Windows system events, and feed them into Copilot, looking for potentially malicious activity. And while it’s not perfect, it did manage to detect about 40% of the malicious tests that Windows Defender missed. It seems like LLMs are going to stick around, and this might be one of the places they actually make sense.

Bits and Bytes

Apple has pushed updates to their entire line, fixing a pair of 0-day vulnerabilities. The first is a wild vulnerability in CoreAudio, in that playing audio from a malicious audio file can lead to arbitrary code execution. The chaser is the flaw in the Pointer Authentication scheme, that Apple uses to prevent memory-related vulnerabilities. Apple has acknowledged that these flaws were used in the wild, but no further details have been released.

The Gnome desktop has an interesting problem, where the yelp help browser can be tricked into reading the contents of arbitrary filesystem files. Combined with the possibility of browser links automatically opening in yelp, this makes for a much more severe problem than one might initially think.

And for those of us following along with Google Project Zero’s deep dive into the Windows Registry, part six of that series is now available. This installment dives into actual memory structures, as well as letting us in on the history of why the Windows registry is called the hive and uses the 0xBEE0BEE0 signature. It’s bee themed, because one developer hated bees, and another developer thought it would be hilarious.

 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

Will it Run Llama 2? Now DOS Can Tyler August | usagoldmines.com

Open Source DMR Radio Al Williams | usagoldmines.com

Restoring an Abandoned Game Boy Kiosk Maya Posch | usagoldmines.com

Haircuts in Space: How to Keep Your Astronauts Looking Fresh Maya Posch | usagoldmines.com

Robot Picks Fruit and Changes Light Bulbs with Measuring Tape Tyler August | usagoldmines.com

A Pi-Based LiDAR Scanner Bryan Cockfield | usagoldmines.com

Vintage Game Rides Again Thanks to Modern Tech Dan Maloney | usagoldmines.com

Hackaday Podcast Episode 317: Quantum Diamonds, Citizen Science, and Cobol to AI Al Williams | usago...

Presence Detection Augments 1930s Home Bryan Cockfield | usagoldmines.com

D20-shaped Quasicrystal Makes High-Strength Alloy Printable Tyler August | usagoldmines.com

Track Your Circuits: A Locomotive PCB Badge Matt Varian | usagoldmines.com

Tiny, Hackable Telepresence Robot for under $100? Meet Goby Donald Papp | usagoldmines.com

Rise of the Robots: How Robots Are Changing Dairy Farms Maya Posch | usagoldmines.com

A Blacksmith Shows Us How To Choose An Anvil Jenny List | usagoldmines.com

Designing an FM Drum Synth from Scratch Dan Maloney | usagoldmines.com

Bicycle Gearbox Does it by Folding Fenix Guthrie | usagoldmines.com

Supercon 2024: Exploring the Ocean with Open Source Hardware Tom Nardi | usagoldmines.com

Budget Schlieren Imaging Setup Uses 3D Printing to Reveal the Unseen Tyler August | usagoldmines.com

Modernizing an Enigma Machine Matt Varian | usagoldmines.com

Using a MIG Welder, Acetylene Torch, and Air Hammer to Remove a Broken Bolt John Elliot V | usagoldm...

An Absolute Zero of a Project Dan Maloney | usagoldmines.com

GK STM32 MCU-Based Handheld Game System Maya Posch | usagoldmines.com

Making a Variable Speed Disc Sander from an Old Hard Drive John Elliot V | usagoldmines.com

FLOSS Weekly Episode 829: This Machine Kills Vogons Jonathan Bennett | usagoldmines.com

SpaceMouse Destroyed for Science Fenix Guthrie | usagoldmines.com

Porting COBOL Code and the Trouble With Ditching Domain Specific Languages Maya Posch | usagoldmines...

Homemade VNA Delivers High-Frequency Performance on a Budget Dan Maloney | usagoldmines.com

Binner Makes Workshop Parts Organization Easy Matt Varian | usagoldmines.com

Something is Very Wrong With the AY-3-8913 Sound Generator Maya Posch | usagoldmines.com

Replica of 1880 Wireless Telephone is All Mirrors, No Smoke Tyler August | usagoldmines.com

DIY AI Butler Is Simpler and More Useful Than Siri Donald Papp | usagoldmines.com

Making Parts Feeders Work Where They Weren’t Supposed To Lewin Day | usagoldmines.com

A New Kind of Bike Valve? Fenix Guthrie | usagoldmines.com

Announcing the Hackaday Pet Hacks Contest Elliot Williams | usagoldmines.com

New Brymen Bluetooth BM788BT Digital Multimeter Coming Soon John Elliot V | usagoldmines.com

Keebin’ with Kristina: the One with John Lennon’s Typewriter Kristina Panos | usagoldmines.com

Shine On You Crazy Diamond Quantum Magnetic Sensor Dan Maloney | usagoldmines.com

This Potato Virtual Assistant is Fully Baked Seth Mabbott | usagoldmines.com

Building A DIY Tornado Tower Lewin Day | usagoldmines.com

Plasmonic Modulators Directly Convert Terahertz Waves to Optical Signals Maya Posch | usagoldmines.c...

Elastic Bands Enable Touchable Volumetric Display Aaron Beckendorf | usagoldmines.com

ESP32-Powered Clock Brings Aviation Style To Your Desk Lewin Day | usagoldmines.com

Cybercriminals Hijacking Popular Crypto Software To Steal Digital Assets From Wallets: Security Rese...

Converting the C64 Mini Into A C64C Lewin Day | usagoldmines.com

Linux Fu: Stopping a Runaway Al Williams | usagoldmines.com

A Cheap Yellow Display Makes A Video Walkie Talkie Jenny List | usagoldmines.com

Jenny’s (Not Quite) Daily Drivers: Raspberry Pi 1 Jenny List | usagoldmines.com

DIY scanning spectrometer is a bright idea Tyler August | usagoldmines.com

A Tricky Commodore PET Repair and a Lesson About Assumptions Maya Posch | usagoldmines.com

Introducing Infrared Remote Control Protocols John Elliot V | usagoldmines.com

The ProStar: the Portable Gaming System and Laptop From 1995 Maya Posch | usagoldmines.com

Hackaday Links: April 13, 2025 Dan Maloney | usagoldmines.com

3D Printed Milling Machine is Solid as a Rock Tyler August | usagoldmines.com

The Spade Hardware Description Language John Elliot V | usagoldmines.com

Satisfy Your High-Voltage Urges with This Printable Flyback Transformer Dan Maloney | usagoldmines.c...

Software Project Pieces Broken Bits Back Together Donald Papp | usagoldmines.com

Learning Linux Kernel Modules Using COM Binary Support Maya Posch | usagoldmines.com

A 17th Century Music Computer Al Williams | usagoldmines.com

The Incomplete JSON Pretty Printer (Brought To You By Vibes) Donald Papp | usagoldmines.com

Hacking a Cheap Rechargeable Lamp With Non-Standard USB-C Connector Maya Posch | usagoldmines.com

Vibe Check: False Packages a New LLM Security Risk? Tyler August | usagoldmines.com

JPMorgan Chase Refuses To Reimburse $440,000 After Customer’s Account Hammered With Illicit Withdraw...

DIY Soldering Tweezers, Extra Thrifty Donald Papp | usagoldmines.com

Biting Off More Than I Can Chew Elliot Williams | usagoldmines.com

Bank of America Discloses Data Breach After Customers’ Documents Disappear, Says Names, Addresses, A...

Tiny Pogo Robot Gets Wings, Does Flips Donald Papp | usagoldmines.com

Repairing Classic Sound Cards Jenny List | usagoldmines.com

Tracing the #!: How the Linux Kernel Handles the Shebang Maya Posch | usagoldmines.com

Creating a Somatosensory Pathway From Human Stem Cells Maya Posch | usagoldmines.com

Bank of America Handing $2,850,000 To Customers in Settlement Over Alleged Illegal Fees and Account ...

Gemini 2.0 + Robotics = Slam Dunk? John Elliot V | usagoldmines.com

A Mouse, No Hands! Jenny List | usagoldmines.com

Hackaday Podcast Episode 316: Soft Robots, Linux the Hard Way, Cellphones into SBCs, and the Circuit...

GPS Broken? Try TV! Al Williams | usagoldmines.com

Audio Effects Applied to Text Al Williams | usagoldmines.com

This Week in Security: AI Spam, SAP, and Ivanti Jonathan Bennett | usagoldmines.com

The Jupiter Ace Remembered Al Williams | usagoldmines.com

Brush Up on Your Trade Craft With This Tiny FM Bug Dan Maloney | usagoldmines.com

Farewell Economy 7, a Casualty of the Long Wave Switch-Off Jenny List | usagoldmines.com

Using Integer Addition to Approximate Float Multiplication Maya Posch | usagoldmines.com

Windows on ARM on Arm Bryan Cockfield | usagoldmines.com

A New Mechanical Keyboard for an Old Computer Bryan Cockfield | usagoldmines.com

Improving Magnetoplasmadynamic Ion Thrusters With Superconductors Maya Posch | usagoldmines.com

Ask Hackaday: What’s a Sun-Like Star? Al Williams | usagoldmines.com

Clever Engineering Leaves Appliance Useless Tom Nardi | usagoldmines.com

Everyone’s Talking GPMI, Should you? Jenny List | usagoldmines.com

Making Liquid Oxygen: Far From Easy but Worth the Effort Dan Maloney | usagoldmines.com

Ask Hackaday: Vibe Coding Jenny List | usagoldmines.com

Ask Hackaday: Vibe Coding Jenny List | usagoldmines.com

Going to the Top with a Raspberry Pi Elevator Al Williams | usagoldmines.com

FLOSS Weekly Episode 828: Incus Inception Jonathan Bennett | usagoldmines.com

Self-Hosting a Cluster on Old Phones Bryan Cockfield | usagoldmines.com

You Shouldn’t Build an X-Ray Machine, But You Could Al Williams | usagoldmines.com

In 2025, The Philly Maker Faire Finds Its Groove Tom Nardi | usagoldmines.com

Forget Propellers, Embrace Tentacle-based Locomotion Donald Papp | usagoldmines.com

Better Bearings Take the Wobble Out of Premium Scroll Wheel Dan Maloney | usagoldmines.com

Salamander Robot is Squishy Al Williams | usagoldmines.com

Dozens of Solenoids Turn Vintage Typewriter into a Printer Dan Maloney | usagoldmines.com

ASCII to Mainframe Al Williams | usagoldmines.com

Designing A Tone Control Properly Jenny List | usagoldmines.com

Leave a Reply