Blog

Weekly Security Alert – June 23, 2025

 

Skip to Key Ideas Q and A

PDI’s Weekly Threat Intelligence Summary is compiled by our expert threat analysts, highlighting the key threat events you should know about and offering mitigation recommendations.

Quick Answers

Q: What is the Grafana Ghost vulnerability (CVE-2025-4123)?
A: CVE-2025-4123 is a critical flaw in Grafana that enables account takeovers via malicious links; over 46,000 instances remain exposed as of June 2025.

Q: What vulnerabilities should IT teams patch immediately?
A: Critical flaws in Next.js, Kubernetes, Windows CLFS, SAP NetWeaver, and Erlang/OTP should be patched now to prevent high-impact exploits.

Q: Why is ipify[.]org flagged in threat hunts?
A: Threat actors may abuse ipify[.]org to identify infected systems’ public IP addresses, even though it’s commonly used for legitimate purposes.

Over 46,000 Grafana Instances Exposed to Malicious Account Takeover Attacks

Threat Hunting

Trending Vulnerabilities

Top InfoStealer Malware

Top Ransomware Actors

Top Intelligence Events

Threat Brief (High):

Over 46,000 Grafana Instances Exposed to Malicious Account Takeover Attacks

On June 15, 2025, security experts warned about a critical vulnerability affecting over 46,000 publicly accessible Grafana instances worldwide, with 36% of all public-facing deployments vulnerable to complete account takeover attacks. The vulnerability, tracked as CVE-2025-4123, affects multiple versions of the open-source platform used for monitoring and visualizing infrastructure and application metrics.

According to research analysis, attackers can exploit the vulnerability by luring victims into clicking malicious URLs resulting in arbitrary JavaScript execution. This can lead to user session takeovers, account credential modifications, and server-side request forgery attacks.

CVE-2025-4123, also dubbed “The Grafana Ghost,” was discovered and patched back in May 2025. However, as of this writing, at least 46,506 instances are still running vulnerable versions, leaving them open to potential exploitation.

Organizations should immediately upgrade to patched Grafana versions to mitigate this critical vulnerability.

  • Available security patches include versions 10.4.18+security-01, 11.2.9+security-01, 11.3.6+security-01, 11.4.4+security-01, 11.5.4+security-01, 11.6.1+security-01, and 12.0.0+security-01.

Threat Hunting

The Threat Hunting Team at PDI utilizes trends and actionable intelligence to determine which hunts to prioritize. Here are the most significant hunts from the past week, along with the necessary log dependencies and a brief summary of each:

Threat Hunt: Potentially Malicious ipify[.]org API Calls
Date: 6/12/2025
Log Dependencies: EDR Solutions (SentinelOne, Crowdstrike)
Summary: Malware has been observed executing enumeration commands to gather information about infected machines. One such command may involve using the ipify API to determine the machine’s public IP address. Due to the high volume of legitimate usage, PDI’s threat hunters will continue to periodically monitor these API calls for signs of malicious activity.

Top Intelligence Trends

Vulnerabilities

Below are the top five trending vulnerabilities of the week. Trends are determined by criticality, activity, mentions, and exploitability. If your organization uses any of these technologies, you should prioritize patching against these threats.

  • CVE-2025-29927 – Next.js is a React framework for building full-stack web applications. Prior to 14.2.25 and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommended that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 14.2.25 and 15.2.3.
  • CVE-2025-1974 – A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller. This can lead to disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
  • CVE-2025-29824 – Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
  • CVE-2025-31324 – SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper authorization, allowing unauthenticated agent to upload potentially malicious executable binaries that could severely harm the host system. This could significantly affect the confidentiality, integrity, and availability of the targeted system.
  • CVE-2025-32433 – Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules.

InfoStealer Malware

PDI’s Threat Intelligence Team is constantly analyzing data from dark web marketplaces to keep a pulse on InfoStealer malware trends. The team identifies and studies these covert threats to arm our clients and guide our threat hunting operations. Our analysis of these cybercriminal exchanges aids in predicting and countering these InfoStealer threats, safeguarding our clients’ digital assets.

Top 5 Infostealers

Top 5 Infostealers

Ransomware Actors

PDI’s Threat Intelligence Team remains vigilant by observing communications and activities of ransomware operators on their extortion websites. These persistent monitoring efforts yield direct insights into their evolving strategies and tactics. This critical intelligence underpins our proactive stance in predicting and mitigating potential ransomware threats, thereby enhancing the security framework for our clients and driving our threat hunting operations effectively.
Ransomware Extortion

Ransomware Extortion Published


Key Ideas Q and A

Q: What is the Grafana Ghost vulnerability (CVE-2025-4123) and why does it matter?
A: CVE-2025-4123 is a critical Grafana flaw that enables account takeovers via malicious links—over 46,000 servers remain exposed as of June 2025.

Q: How many Grafana servers are still vulnerable?
A: More than 46,000 Grafana instances are still open to account takeover and server-side forgery attacks from CVE-2025-4123.

Q: What should organizations do about CVE-2025-4123?
A: To stay secure, upgrade immediately to Grafana 10.4.18+security-01 or newer.

Q: Why is ipify[.]org showing up in threat hunts?
A: Attackers may use ipify[.]org to discover infected machines’ public IPs—despite its legitimate use, it can signal compromise.

Q: What vulnerabilities should be patched right now?
A: Patch critical flaws in Next.js, Kubernetes, Windows CLFS, SAP NetWeaver, and Erlang/OTP to prevent high-impact exploits.

Q: What’s new in InfoStealer malware activity?
A: PDI tracks InfoStealer trends via dark web sources to counter emerging credential theft and data leaks.

Q: How is PDI tracking ransomware threats?
A: PDI monitors ransomware extortion sites for real-time threat insights to help retailers stay ahead of attacks.

Request your free threat assessment.

Back to top ↑

Have you registered for our next event?