Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Rapidly Exploited: PostgreSQL Zero-Day in BeyondTrust Breach Raises Cybersecurity Concerns



A PostgreSQL zero-day vulnerability was exploited in a recent breach of BeyondTrust, highlighting the need for organizations to prioritize regular software updates and robust cybersecurity measures.



  • The network of privileged access management company BeyondTrust was breached by attackers who exploited a PostgreSQL security flaw as a zero-day attack vector.
  • The breach highlights the importance of regular software updates and robust cybersecurity measures to protect against such attacks.
  • A similar breach occurred at the U.S. Treasury Department, which was also targeted by Chinese state-backed hackers.
  • The attackers managed to gain unauthorized access to the Treasury's Office of Financial Research systems, although the full extent of the impact is still being assessed.
  • A new zero-day vulnerability in PostgreSQL (CVE-2025-1094) has been discovered, which was reported and patched on January 27.
  • Organizations must prioritize regular software updates and patching, as well as implement robust cybersecurity measures such as network segmentation and multi-factor authentication.



  • In a recent high-profile incident, the network of privileged access management company BeyondTrust was breached by attackers who exploited a PostgreSQL security flaw as a zero-day attack vector. This breach not only highlights the importance of regular software updates but also underscores the need for robust cybersecurity measures to protect against such attacks.

    According to information released by BeyondTrust, the attack occurred in early December when the attackers utilized two zero-day bugs (CVE-2024-12356 and CVE-2024-12686) and a stolen API key to breach the company's systems. Subsequently, less than a month later, the U.S. Treasury Department announced that its network was also compromised by threat actors who employed a similar tactic of using a stolen Remote Support SaaS API key.

    The breach, attributed to Chinese state-backed hackers tracked as Silk Typhoon, a notorious cyber-espionage group involved in reconnaissance and data theft attacks, has drawn significant attention due to the attackers' targeting of sensitive organizations such as the Committee on Foreign Investment in the United States (CFIUS) and the Office of Foreign Assets Control (OFAC). These entities play critical roles in reviewing foreign investments for national security risks and administering trade and economic sanctions programs.

    In light of this breach, it has become evident that the attackers managed to gain unauthorized access to the Treasury's Office of Financial Research systems. The full extent of the impact from this incident is still being assessed, but cybersecurity experts have emphasized the need for immediate action to bolster network defenses against similar threats.

    BeyondTrust revealed that its patch for CVE-2024-12356 successfully prevented the exploitation of both vulnerabilities; however, Rapid7 security researchers have identified a method to exploit CVE-2025-1094 for remote code execution in vulnerable BeyondTrust Remote Support (RS) systems independently of the CVE-2024-12356 argument injection vulnerability.

    Moreover, Rapid7 has discovered that while the patch for CVE-2024-12356 does not address CVE-2025-1094's root cause, it effectively prevents the exploitation of both vulnerabilities. This finding highlights the importance of conducting thorough vulnerability assessments and implementing robust security measures to mitigate potential risks.

    The analysis of CVE-2025-1094 by Rapid7 uncovered a new zero-day vulnerability in PostgreSQL, which was reported on January 27 and subsequently patched on Thursday. According to information released by the PostgreSQL security team, this vulnerability allows SQL injections when the PostgreSQL interactive tool reads untrusted input due to improper neutralization of quoting syntax.

    To address these vulnerabilities, it is essential for organizations to prioritize regular software updates and patching, as well as implement robust cybersecurity measures such as network segmentation, intrusion detection systems, and multi-factor authentication. Furthermore, conducting thorough vulnerability assessments and engaging with reputable security consulting firms can provide critical insights into potential attack vectors.

    In conclusion, the recent breach of BeyondTrust highlights the pressing need for organizations to bolster their cybersecurity defenses against sophisticated threats. By staying informed about emerging vulnerabilities and implementing robust security measures, organizations can significantly reduce their risk exposure and protect sensitive information from falling into the wrong hands.



    Related Information:

  • https://www.bleepingcomputer.com/news/security/postgresql-flaw-exploited-as-zero-day-in-beyondtrust-breach/

  • https://nvd.nist.gov/vuln/detail/CVE-2024-12356

  • https://www.cvedetails.com/cve/CVE-2024-12356/

  • https://nvd.nist.gov/vuln/detail/CVE-2024-12686

  • https://www.cvedetails.com/cve/CVE-2024-12686/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-1094

  • https://www.cvedetails.com/cve/CVE-2025-1094/

  • https://attack.mitre.org/groups/G0125/

  • https://en.wikipedia.org/wiki/HAFNIUM_(group)


  • Published: Fri Feb 14 10:19:16 2025 by llama3.2 3B Q4_K_M













     |   |   |  Sub Stack  |  Blue Sky


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us