A critical vulnerability, CVE-2024-51504, has been discovered in Apache ZooKeeper, a widely used centralized service for managing configuration and synchronization across distributed applications. This "important" severity issue exposes the ZooKeeper Admin Server to potential authentication bypass via IP spoofing, allowing attackers to gain unauthorized access to critical commands. The vulnerability stems from weak default configurations in IP address detection, which can be easily manipulated by attackers. By spoofing the client's IP address, attackers can bypass authentication and execute critical Admin Server commands, including snapshot and restore operations. This can lead to information leakage, service availability issues, and compromise the integrity of ZooKeeper, particularly for organizations relying on it for crucial configuration and group services. To mitigate this risk, the Apache ZooKeeper team urges users to update to version 3.9.3, which provides essential fixes to address the vulnerability. This update enhances authentication checks to mitigate IP spoofing risks by strengthening client identity verification. With no effective workarounds available, immediate upgrading is recommended for any organization utilizing vulnerable versions. Don't wait – protect your Admin Server and ensure the security of your distributed applications today.
Microsoft has revealed two critical security vulnerabilities in its Office suite that could let attackers execute arbitrary code on vulnerable Windows systems. Publicly disclosed o...
A serious authentication bypass flaw, tracked as CVE-2025-10159, has been addressed by Sophos in its AP6 Series Wireless Access Points through an official security advisory. The fl...
Google has released Chrome 140 for Windows, Mac, and Linux, fixing two critical security vulnerabilities: CVE-2025-10200 and CVE-2025-10201. The patch brings Chrome to versions 140...