Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

PHOTO ESSAY: A rickshaw driver and his dog are winning hearts in Nepal’s Kathmandu

July 30, 2025

Female tour guides in Afghanistan lead women-only groups as some travelers return

July 30, 2025

Starbucks looks to protein drinks, other new products to turn around lagging sales

July 29, 2025
Facebook X (Twitter) Instagram
Trending
  • PHOTO ESSAY: A rickshaw driver and his dog are winning hearts in Nepal’s Kathmandu
  • Female tour guides in Afghanistan lead women-only groups as some travelers return
  • Starbucks looks to protein drinks, other new products to turn around lagging sales
  • How Larry Ellison And David Ellison Pulled Off The Paramount Deal
  • Tracee Ellis Ross offers tips on solo travel in new docuseries for Roku
  • Booker Prize winner Kiran Desai is up for the award again with a long-awaited novel
  • How to inspire kids to start gardening
  • 1 in 10 Americans now millionaires, but the status loses some luster
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Wednesday, July 30
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Mass Exploitation of Critical PHP Vulnerability Begins
Cybersecurity

Mass Exploitation of Critical PHP Vulnerability Begins

adminBy adminMarch 10, 2025No Comments2 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 66


Threat actors have started exploiting en masse a critical vulnerability in PHP that could allow remote code execution on vulnerable servers, threat intelligence firm GreyNoise warns.

The flaw, tracked as CVE-2024-4577 (CVSS score of 9.8), can be exploited on Windows servers that are using Apache and PHP-CGI, if they are set to use certain code pages, to inject arguments remotely and execute arbitrary code.

Because PHP’s implementation in Windows did not consider the ‘Best-Fit’ behavior that controls the conversion of Unicode characters to the closest matching ANSI characters, attackers could supply specific character sequences that, when converted, would be misinterpreted as PHP options by the php-cgi module.

CVE-2024-4577 was publicly disclosed in June 2024, and the first exploitation attempts, attributed to a ransomware gang, were observed only two days later.

Last week, Cisco warned that, since January 2025, the security defect has been exploited in a malicious campaign targeting Japanese organizations across the education, entertainment, ecommerce, technology, and telecommunications sectors.

As part of the attacks, the attackers execute tools to gain System privileges, modify registry keys and add scheduled tasks to achieve persistence, and create malicious services using plugins of the Cobalt Strike kit ‘TaoWu’.

Now, GreyNoise says that the exploitation of CVE-2024-4577 is not limited to Japan. In fact, notable activity spikes have been observed in the US, the UK, Singapore, Indonesia, Taiwan, Hong Kong, India, Spain, and Malaysia as well.

“GreyNoise’s Global Observation Grid (GOG) — a worldwide network of honeypots — detected 1,089 unique IPs attempting to exploit CVE-2024-4577 in January 2025 alone,” the cybersecurity firm notes, warning that there are 79 publicly available exploits targeting the flaw.

Advertisement. Scroll to continue reading.

Over the past month, more than 43% of the IPs used in attacks targeting CVE-2024-4577 were from Germany and China, and GreyNoise in February observed an increase in exploitation against systems worldwide, “suggesting additional automated scanning for vulnerable targets”.

CVE-2024-4577 impacts all versions of PHP on Windows, and was addressed in PHP versions 8.1.29, 8.2.20, and 8.3.8. Users are advised to update their installations as soon as possible.

Related: Exploitation Long Known for Most of CISA’s Latest KEV Additions

Related: Exploitation of Old ThinkPHP, OwnCloud Vulnerabilities Surges

Related: CISA Issues Exploitation Warning for .NET Vulnerability

Related: Exploitation of Over 700 Vulnerabilities Came to Light in 2024



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Don't Miss
Billionaires

How Larry Ellison And David Ellison Pulled Off The Paramount Deal

July 29, 2025

David Ellison, son of software centi-billionaire Larry Ellison, nurtured a relationship with Paramount over the…

The Founder Of Shake Shack Is Now A Billionaire

July 26, 2025

‘South Park’ Creators Trey Parker and Matt Stone Are Now Billionaires

July 25, 2025

How Jeffrey Epstein Got So Rich

July 25, 2025
Our Picks

PHOTO ESSAY: A rickshaw driver and his dog are winning hearts in Nepal’s Kathmandu

July 30, 2025

Female tour guides in Afghanistan lead women-only groups as some travelers return

July 30, 2025

Starbucks looks to protein drinks, other new products to turn around lagging sales

July 29, 2025

How Larry Ellison And David Ellison Pulled Off The Paramount Deal

July 29, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.