SecPod Labs
Security Research
In-depth CVE write-ups, vulnerability analysis, and security intelligence from the SecPod Research team.

CVE Research
Reject, Repeat, Restart: RADIUS Bug Triggers Cisco ISE DoS
A vulnerability in Cisco Identity Services Engine (ISE) could allow remote attackers to trigger unexpected system restarts, leading to a denial-of-service (DoS) condition. The vulnerability stems from how ISE handles repeated authentication failures, and organizations relying on ISE for network acce...

CVE Research
Critical Chrome Vulnerabilities Patched: WebGPU and V8 Flaws Fixed in Latest Release
Google has urgently released a security update for Chrome, addressing multiple vulnerabilities that could allow attackers to execute code remotely on affected systems. The update, version 142.0.7444.134 and 142.0.7444.135, is rolling out across Windows, Mac, and Linux, while Android users will recei...

CVE Research
Beyond CVSS: Using MITRE ATT&CK for smarter prioritization
Cloud teams face more findings than available hours. The gap is not detection, it is deciding what deserves action now. A decision-first approach ranks cloud risks using clear outcome levels that turn scattered alerts into a plan shared by operators and leadership. Saner Cloud Security Risk Prioriti...

CVE Research
Control Web Panel Breached: Critical RCE Exploited in the Wild
A critical vulnerability has been identified in Control Web Panel (CWP), a widely used web hosting control panel also known as CentOS Web Panel, which is now under active exploitation. The Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert regarding this vulnerability, ident...

CVE Research
Chrome 142 Released: High-Severity V8 Flaws Fixed, $100K in Rewards Paid
Google has released Chrome 142, addressing a total of 20 security flaws, including two high-severity vulnerabilities affecting the V8 JavaScript engine. The company awarded a total of $100,000 in bug bounties to researchers who reported these critical issues.

CVE Research
Under UNC6384’s LNK: CVE-2025-9491 Powers PlugX Espionage Attacks
A Windows LNK (shortcut) UI-misrepresentation vulnerability (CVE-2025-9491, ZDI-CAN-25373) is being actively exploited by a China-linked threat actor tracked as UNC6384 to deliver the PlugX Remote Access Trojan (RAT) against European diplomatic and government targets. The flaw enables malicious .LNK...

CVE Research
RDSEED Vulnerability in AMD Zen 5: A Threat to Hardware Randomness Integrity
AMD has confirmed a significant flaw in the RDSEED instruction used for hardware-level random number generation on Zen 5 CPUs. The vulnerability, cataloged as AMD-SB-7055 and assigned CVE-2025-62626, can cause the 16-bit and 32-bit RDSEED variants to return zero instead of genuine entropy, which sof...

CVE Research
BadCandy: Stealth Implant Converts IOS XE into a Persistent Surveillance Node
Cybercriminals and advanced persistent threat (APT) actors continue to evolve toward stealthier, persistence-focused, and profit-driven operations. Recent intelligence reports reveal a coordinated exploitation campaign combining high-severity vulnerabilities—the Cisco IOS XE privilege escalation fla...

CVE Research
Breaking the Kernel: How Hackers Can Gain Root Access on Ubuntu
A critical vulnerability has been discovered in Ubuntu’s Linux kernel, potentially allowing local attackers to escalate their privileges and gain root access on vulnerable systems. This flaw stems from a reference count imbalance within the af_unix subsystem, leading to a use-after-free (UAF) condit...
