Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

A Critical PostgreSQL Vulnerability Exposed: A Zero-Day Attack on the US Treasury


The recent discovery of a critical PostgreSQL vulnerability has highlighted the ongoing risks associated with exploiting zero-day attacks on sensitive systems. Experts have warned that immediate action is necessary to address this vulnerability, emphasizing the importance of continuous monitoring, vulnerability management, and timely patching. The incident serves as a stark reminder of the need for robust security measures and incident response strategies in protecting against such threats.

  • Rapid7 discovered a critical PostgreSQL vulnerability (CVE-2025-1094) that allows arbitrary code execution.
  • The bug was exploited alongside a zero-day attack on the US Treasury and provides a vector for attackers to execute shell commands on the operating system.
  • PostgreSQL developers made an incorrect assumption about SQL injection attacks, making it possible for attackers to exploit the vulnerability.
  • Rapid7 released updated versions of PostgreSQL's interactive tool to prevent exploitation, but users are advised to apply these updates ASAP.
  • The incident highlights the importance of continuous monitoring, vulnerability management, and timely patching by organizations.



  • The recent discovery of a critical vulnerability in the PostgreSQL interactive tool has sent shockwaves through the cybersecurity community, with experts warning that it was exploited alongside a zero-day attack on the US Treasury. The bug, identified as CVE-2025-1094, is rated 8.1 on the CVSS scale and can lead to arbitrary code execution (ACE) when used in conjunction with specific input.

    The vulnerability was uncovered by Rapid7, a leading cybersecurity firm that specializes in identifying and mitigating security threats. According to Stephen Fewer, Principal Security Researcher at Rapid7, "Rapid7 discovered that in every scenario we tested, a successful exploit for CVE-2024-12356 had to include exploitation of CVE-2025-1094 in order to achieve remote code execution."

    This means that the vulnerability was not only used as part of an attack chain but also served as a critical component that enabled the attackers to bypass security measures. The implications are significant, and experts have emphasized the need for immediate action to address this vulnerability.

    The bug is attributed to an incorrect assumption made by PostgreSQL developers regarding SQL injection attacks. In reality, attackers can exploit the vulnerability by leveraging certain string escaping routines used in PostgreSQL's handling of invalid UTF-8 characters, which allows them to execute malicious SQL statements.

    Furthermore, the bug provides a vector for attackers to execute shell commands on the operating system using specific meta-commands within the psql tool. This capability enables attackers to gain unauthorized access and control over the affected systems.

    Fortunately, Rapid7 has released the latest versions of PostgreSQL's interactive tool, which should prevent exploitation of this vulnerability. However, users are advised to apply these updates as soon as possible to ensure their systems remain secure.

    It is also worth noting that BeyondTrust patched its zero-day attack in December 2024, and while the patch addressed the specific vulnerability being exploited at the time, it did not address the root cause of CVE-2025-1094. As a result, there remains a risk of exploitation if an attacker were to discover alternative methods for exploiting this vulnerability.

    The incident highlights the ongoing importance of continuous monitoring, vulnerability management, and timely patching by organizations. Moreover, the attack demonstrates that adversaries will stop at nothing to exploit vulnerabilities, emphasizing the need for robust security measures and incident response strategies.

    Caitlin Condon, Director of Vulnerability Intelligence at Rapid7, expressed her appreciation for the cooperation and communication from PostgreSQL developers during the disclosure process. She also praised the team's dedication to transparency, saying it was "one of the most straightforward disclosure timelines we've been able to put in a [coordinated vulnerability disclosure] blog in a while."

    In light of this incident, cybersecurity experts and organizations alike are being reminded of the critical importance of maintaining robust security measures, conducting regular vulnerability assessments, and promptly applying patches to prevent exploitation. By doing so, they can minimize their exposure to such attacks and protect against potential breaches.



    Related Information:

  • https://go.theregister.com/feed/www.theregister.com/2025/02/14/postgresql_bug_treasury/

  • https://www.msn.com/en-us/money/news/critical-postgresql-bug-tied-to-zero-day-attack-on-us-treasury/ar-AA1z3LyW

  • https://www.bleepingcomputer.com/news/security/postgresql-flaw-exploited-as-zero-day-in-beyondtrust-breach/

  • https://nvd.nist.gov/vuln/detail/CVE-2024-12356

  • https://www.cvedetails.com/cve/CVE-2024-12356/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-1094

  • https://www.cvedetails.com/cve/CVE-2025-1094/


  • Published: Fri Feb 14 08:41:20 2025 by llama3.2 3B Q4_K_M













     |   |   |  Sub Stack  |  Blue Sky


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us