Over 10 years we help companies reach their financial and branding goals. Engitech is a values-driven technology agency dedicated.

Gallery

Contacts

411 University St, Seattle, USA

engitech@oceanthemes.net

+1 -800-456-478-23

Security News
TJS Weekly Security Intelligence Briefing

January 12th TJS Weekly Security Intelligence Briefing

Table of Contents

Week of January 12th, 2026
Classification: TLP: Public
Weekly Security Intelligence Briefing


1. Executive Summary

The week of January 6-12, 2026 presented an elevated risk posture driven by actively exploited vulnerabilities affecting MongoDB, Chrome, VMware, React/Next.js, Veeam, and Gogs. The most urgent priorities are:

  1. MongoDB MongoBleed (CVE-2025-14847): Unauthenticated memory disclosure actively exploited since December 26, 2025, with ~87,000 vulnerable instances globally. CISA KEV deadline: January 19, 2026.
  2. React2Shell (CVE-2025-55182): CVSS 10.0 critical RCE in React Server Components/Next.js with widespread exploitation by Chinese APT groups and botnets. Approximately 90,300 vulnerable instances identified.
  3. Veeam Backup & Replication (CVE-2025-59470): CVSS 9.0 RCE affecting all version 13 builds. Given Veeam’s history as a ransomware target (Akira, Fog), immediate patching is critical.
  4. Gogs Zero-Day (CVE-2025-8110): Symlink path traversal RCE added to CISA KEV January 12, 2026. Over 700 confirmed compromised instances. No patch available; mitigations required.

Additional threats include VMware ESXi zero-days exploited by Chinese actors since February 2024, browser extension malware stealing AI conversations from 900,000+ users, and sophisticated phishing campaigns bypassing MFA. Microsoft Patch Tuesday occurs January 14, 2026.

Overall Risk Posture: ELEVATED


2. Critical Action Items

  1. MongoDB MongoBleed (CVE-2025-14847): Patch immediately to versions 8.2.3, 8.0.17, 7.0.28, 6.0.27, 5.0.32, or 4.4.30. CISA KEV deadline: January 19, 2026. If patching is delayed, disable zlib compression: mongod --networkMessageCompressors snappy,zstd
  2. React2Shell (CVE-2025-55182): Update React to ≥19.0.1/19.1.2/19.2.1 and Next.js to ≥15.3.2. CVSS 10.0 – Critical. Monitor for exploitation indicators.
  3. Veeam Backup & Replication (CVE-2025-59470): Update to version 13.0.1.1071. All version 13 builds prior are vulnerable.
  4. Gogs (CVE-2025-8110): No patch available. Disable open registration, restrict internet exposure, place behind VPN. CISA KEV deadline: February 2, 2026.
  5. Chrome/Edge Browser Update (CVE-2026-0628): Update to version 143.0.7499.192+. Remove malicious extensions (IDs: fnmihdojmnkclgjpcoonokmkhjpjechg, inhcgfpbfdjbjogdfjbclgolkmhnooop).
  6. HPE OneView (CVE-2025-37164): CVSS 10.0 RCE. Apply patches for all versions prior to 11.00. CISA KEV deadline: January 28, 2026.

3. Key Security Stories

Story 1: React2Shell (CVE-2025-55182) – Critical RCE Under Widespread Exploitation

A maximum-severity vulnerability (CVSS 10.0) in React Server Components dubbed “React2Shell” is under widespread active exploitation by multiple threat actors including Chinese APT groups and botnets.

Affected Components:

  • React Server Components (react-server package)
  • Next.js framework (tracked separately as CVE-2025-66478, now merged into CVE-2025-55182)
  • Affected versions: React 19.0, 19.1.0, 19.1.1, 19.2.0

Exploitation Timeline:

  • November 29, 2025: Responsible disclosure by Lachlan Davidson
  • December 3, 2025: Public disclosure and patches released
  • December 4, 2025: Public PoC exploit published
  • December 5, 2025: Mass exploitation begins
  • December 5-8, 2025: Surge in exploitation attempts (Trend Micro telemetry)

Threat Actors Observed (Google Threat Intelligence):

  • UNC6600 (China-nexus): Deploying MINOCAT tunneler
  • Earth Lamia / UNC5454 (China-nexus): AWS-reported activity
  • Jackpot Panda (China-nexus): AWS-reported activity
  • RondoDox botnet: Deploying cryptominers, Mirai variants

Attack Mechanism: The vulnerability exploits insecure deserialization in the RSC “Flight” protocol. A single malicious HTTP request can achieve unauthenticated RCE on vulnerable servers. Default Next.js applications created with create-next-app are vulnerable.

Global Exposure: Shadowserver reports ~90,300 vulnerable instances (68,400 in US, 4,300 Germany, 2,800 France, 1,500 India).

Remediation:

# Update React packages
npm update react react-dom react-server

# Update Next.js
npm update next@15.3.2

Patched Versions: React 19.0.1, 19.1.2, 19.2.1; Next.js 15.3.2+

Sources:


Story 2: MongoDB MongoBleed Under Active Exploitation

A critical memory disclosure vulnerability (CVE-2025-14847, CVSS 8.7) in MongoDB Server is being actively exploited. The flaw allows unauthenticated attackers to extract sensitive heap memory including credentials, API keys, and PII.

Affected Versions: MongoDB 3.6 through 8.2.2 with zlib compression enabled (default)

Exploitation Status: Active exploitation confirmed since December 26, 2025 (PoC release). Added to CISA KEV December 29, 2025. Deadline: January 19, 2026.

Global Exposure: ~87,000 vulnerable instances (US: 20,000, China: 17,000, Germany: 8,000 – per Censys)

Attack Mechanism: Attackers send specially crafted compressed packets with mismatched length fields. MongoDB allocates oversized buffers and returns uninitialized “dirty” memory containing remnants of previous operations.

Patched Versions: 8.2.3, 8.0.17, 7.0.28, 6.0.27, 5.0.32, 4.4.30

Mitigation if unable to patch:

# Disable zlib compression
mongod --networkMessageCompressors snappy,zstd

# Or in mongod.conf
net:
  compression:
    compressors: snappy,zstd

Sources:


Story 3: Chinese-Linked Actors Exploited VMware ESXi Zero-Days for Nearly One Year

Security researchers at Huntress disclosed that Chinese-linked threat actors exploited VMware ESXi zero-day vulnerabilities since February 2024, nearly a full year before Broadcom’s March 2025 disclosure.

Vulnerabilities:

  • CVE-2025-22224 (CVSS 9.3): TOCTOU race condition enabling VM escape
  • CVE-2025-22225 (CVSS 8.2): Arbitrary write enabling VM escape
  • CVE-2025-22226 (CVSS 7.1): Information disclosure

Attack Chain:

  1. Initial access via compromised SonicWall VPN credentials
  2. Domain Admin compromise
  3. Deployment of ESXi exploit toolkit (MAESTRO orchestrator)
  4. VM escape using zero-day chain
  5. VSOCKpuppet backdoor installation (VSOCK port 10000)

Toolkit Components:

  • MAESTRO: Orchestration framework
  • MyDriver.sys: Unsigned kernel driver
  • VSOCKpuppet: 64-bit ELF backdoor (VSOCK port 10000)
  • GetShell: Guest VM command execution plugin

Attribution: Simplified Chinese strings including “全版本逃逸–交付” (“All version escape – delivery”) and PDB paths dated February 2024.

Global Exposure: ~30,000 internet-exposed ESXi instances as of January 8, 2026.

Sources:


Story 4: Veeam Backup & Replication Critical RCE (CVE-2025-59470)

Veeam released security updates on January 6, 2026 for four vulnerabilities, including a CVSS 9.0 RCE that allows privileged operators to execute code as the postgres user.

Vulnerabilities Patched:

  • CVE-2025-59470 (CVSS 9.0): RCE via malicious interval/order parameter
  • CVE-2025-55125 (CVSS 7.2): RCE as root via malicious backup config
  • CVE-2025-59469 (CVSS 7.2): Arbitrary file write as root
  • CVE-2025-59468 (CVSS 6.7): RCE via malicious password parameter

Affected Versions: All Veeam Backup & Replication 13.0.1.180 and earlier version 13 builds.

Impact: The postgres user has full administrative control over all databases, tables, and metadata. Compromise enables manipulation of backup metadata, job configurations, and credential theft.

Why This Matters: Veeam vulnerabilities are frequent ransomware targets. Previous VBR flaws (CVE-2024-40711) were exploited by Frag, Akira, and Fog ransomware.

Remediation: Update to version 13.0.1.1071.

Sources:


Story 5: Gogs Zero-Day (CVE-2025-8110) Added to CISA KEV

On January 12, 2026, CISA added CVE-2025-8110 to the KEV catalog. This unpatched zero-day in Gogs self-hosted Git service has compromised over 700 instances.

Vulnerability: Symlink bypass of CVE-2024-55947 (path traversal in PutContents API). Allows authenticated users to overwrite arbitrary files and achieve RCE.

CVSS: 8.7 (High)

Affected Versions: Gogs ≤ 0.13.3

Exploitation Status: Active exploitation since July 2025. Over 1,400 exposed instances identified; 700+ showing signs of compromise (8-character random repository names created around July 10, 2025).

Attack Mechanism:

  1. Attacker creates a git repository
  2. Commits a symbolic link pointing to sensitive target (e.g., .git/config)
  3. Uses PutContents API to write through the symlink
  4. System follows link and overwrites target file outside repository

Remediation (No Patch Available):

  • Disable open registration immediately
  • Place Gogs instances behind VPN
  • Restrict internet exposure using allowlists
  • Monitor for repositories with random 8-character names
  • Audit PutContents API usage

CISA KEV Deadline: February 2, 2026

Sources:


4. Additional Critical Vulnerabilities

n8n Workflow Automation (Multiple Critical CVEs)

Multiple critical vulnerabilities in n8n, a popular workflow automation platform with 100+ million Docker pulls:

CVECVSSDescription
CVE-2026-2185810.0“Ni8mare” – Unauthenticated RCE via Content-Type confusion
CVE-2026-2187710.0Authenticated RCE affecting self-hosted and cloud
CVE-2025-686689.9“N8scape” – Python Code Node sandbox bypass
CVE-2025-686139.9Arbitrary code execution

Remediation: Update to n8n version 1.121.3+ (for CVE-2026-21877) or 2.0.0+ (for CVE-2025-68668).

Sources:

Active exploitation of legacy D-Link DSL gateway routers via command injection in dnscfg.cgi endpoint.

CVSS: 9.3 Status: Actively exploited since November 27, 2025 (Shadowserver) Affected Models: DSL-2740R, DSL-2640B, DSL-2780B, DSL-526B (all EoL) Remediation: Replace with actively supported devices. No patches available.

Source: The Hacker News

AdonisJS Bodyparser Path Traversal (CVE-2026-21440)

Critical path traversal in @adonisjs/bodyparser npm package allowing arbitrary file writes.

CVSS: 9.2 Remediation: Update to latest @adonisjs/bodyparser version.

Source: The Hacker News


5. CISA KEV & Critical CVE Table

CVEProductCVSSStatusDeadlineDescription
CVE-2025-55182React Server Components10.0Actively ExploitedN/AReact2Shell unauthenticated RCE
CVE-2025-37164HPE OneView10.0Actively ExploitedJan 28, 2026Unauthenticated RCE
CVE-2026-21858n8n10.0PatchedN/ANi8mare unauthenticated RCE
CVE-2026-21877n8n10.0PatchedN/AAuthenticated RCE
CVE-2025-59470Veeam Backup9.0PatchedN/ARCE as postgres user
CVE-2025-22224VMware ESXi9.3Actively ExploitedPatch AvailableVM escape TOCTOU
CVE-2025-14847MongoDB Server8.7Actively ExploitedJan 19, 2026MongoBleed memory disclosure
CVE-2009-0556MS PowerPoint8.8Actively ExploitedJan 28, 2026Code injection
CVE-2025-8110Gogs8.7Actively ExploitedFeb 2, 2026Symlink path traversal RCE
CVE-2025-4619Palo Alto PAN-OS8.7PatchedN/ADoS via dataplane packet
CVE-2026-0628Chrome WebViewHighPatched Jan 6N/AScript injection
CVE-2025-22225VMware ESXi8.2Actively ExploitedPatch AvailableVM escape arbitrary write
CVE-2026-0625D-Link DSL Routers9.3Actively ExploitedN/A (EoL)RCE via dnscfg.cgi

2025 KEV Statistics: CISA added 245 vulnerabilities in 2025 (30% increase). Catalog total: 1,486. Microsoft products led with 39 additions.


6. Phishing & Social Engineering Alerts

FBI FLASH: North Korean Kimsuky QR Code Phishing

Alert ID: AC-000001-MW (January 8, 2026)

The FBI warns of North Korean state-sponsored Kimsuky actors using QR code phishing (“quishing”) targeting NGOs, think tanks, academia, and foreign policy experts.

Attack Characteristics:

  • Phishing emails contain QR codes in attachments/embedded images
  • QR codes force pivot from corporate endpoint to personal mobile
  • Bypasses enterprise email security that cannot inspect QR destinations
  • Session token theft enables MFA bypass
  • Leads to account takeover and secondary spearphishing

Mitigation:

  • Train users to verify QR code sources
  • Implement MDM/endpoint security for mobile devices
  • Deploy phishing-resistant MFA (FIDO2/WebAuthn)
  • Monitor for credential entry following QR code scans

Source: FBI IC3

MFA Bypass Techniques Dominating 2026

Active PhaaS Platforms: Tycoon 2FA, NakedPages, Sneaky2FA, Flowerstorm, Salty2FA, Evilginx

Over 90% of credential attacks expected to use sophisticated phishing kits by end of 2026.

Sources: Push Security


7. Supply Chain & Browser Threats

Malicious Browser Extensions Stealing AI Conversations

Extensions Identified:

  • “Chat GPT for Chrome with GPT-5, Claude Sonnet & DeepSeek AI” (ID: fnmihdojmnkclgjpcoonokmkhjpjechg, 600K users)
  • “AI Sidebar with Deepseek, ChatGPT, Claude, and more” (ID: inhcgfpbfdjbjogdfjbclgolkmhnooop, 300K users)

C2 Domains:

  • chatsaigpt[.]com
  • deepaichats[.]com
  • chataigpt[.]pro
  • chatgptsidebar[.]pro

Source: The Hacker News

RondoDox Botnet Exploiting React2Shell

The RondoDox botnet is actively exploiting CVE-2025-55182 to deploy cryptominers and malware across compromised Next.js servers.

Source: The Hacker News


8. Indicators of Compromise

React2Shell (CVE-2025-55182)

Network IOCs (Google/Darktrace):

172.245.5[.]61:38085
5.255.121[.]141
193.34.213[.]15
193.34.213[.]150 (Mirai-associated)

File/Directory Indicators:

  • Hidden directories: $HOME/.systemd-utils
  • Terminated processes: ntpclient
  • Modified files: $HOME/.bashrc (malicious execution logic)
  • Shell scripts: sex.sh (downloads XMRIG)
  • Systemd services: system-update-service

Behavioral Indicators:

  • wget/cURL commands from web server processes
  • HTTP beaconing to rare external IPs
  • Cobalt Strike beacon traffic
  • MeshAgent RMM tool deployment
  • Modified authorized_keys files

Detection (Elastic Security Rule):

network where http.request.method == "POST" and (
  http.response.status_code in (500, 303) and
  http.response.body.content like~ "*E{\"digest\"*" and
  http.request.body.content regex~ """.*\$[0-9]+:[a-zA-Z_0-9]+:[a.*"""
)

MITRE ATT&CK: T1190 (Exploit Public-Facing Application), T1059 (Command Execution), T1496 (Cryptomining)

Sources:


MongoDB MongoBleed (CVE-2025-14847)

Network Indicators:

  • 50,000-100,000 connections/min to port 27017
  • Connections from untrusted source IPs
  • High connection volume without application traffic

Log Indicators:

# Missing client metadata
Event ID 51800

# Connection/disconnection without metadata
Event IDs 22943, 22944

# BSON errors (>1,000 spikes)
"Slow query" with "incorrect BSON length in element"
InvalidBSON errors

Detection Strategy: Aggregate by source IP. Flag IPs with high connection rates lacking client metadata.


VMware ESXi Exploitation

Network Indicators:

  • VSOCK port 10000 traffic (invisible to traditional monitoring)
  • Unusual traffic following SonicWall VPN compromise

Host Indicators:

  • Unsigned driver: MyDriver.sys
  • Modified VMware VMCI drivers
  • VSOCKpuppet backdoor (64-bit ELF)
  • GetShell plugin in guest VMs

Attribution Indicators:

  • Simplified Chinese: “全版本逃逸–交付”
  • PDB paths dated February 2024

Gogs Zero-Day (CVE-2025-8110)

Indicators of Compromise:

  • Repositories with 8-character random names (e.g., “IV79VAew / Km4zoh4s”)
  • Repository creation timestamps around July 10, 2025
  • Unexpected PutContents API usage
  • Symlinks pointing outside repository boundaries

Detection Query (runZero):

_asset.protocol:=http AND protocol:=http AND favicon.ico.image.md5:=5f5b7539f014b9996959f5dcd063d

Malicious Browser Extensions

Extension IDs to Block:

fnmihdojmnkclgjpcoonokmkhjpjechg
inhcgfpbfdjbjogdfjbclgolkmhnooop

Network Indicators:

  • Periodic exfiltration (30-minute intervals)
  • Base64-encoded transmissions
  • C2 domains: chatsaigpt[.]com, deepaichats[.]com, phantomshuttle[.]space

9. Helpful 5: High-Value, Low-Effort Mitigations

1. MongoDB: Disable zlib Compression or Patch

Why: CVE-2025-14847 actively exploited against 87,000+ instances. Unauthenticated credential/PII leak.

How:

# Option 1: Disable zlib
mongod --networkMessageCompressors snappy,zstd

# Option 2: Upgrade
# 8.2.3, 8.0.17, 7.0.28, 6.0.27, 5.0.32, 4.4.30

CIS 18: 7.1, 7.3 | NIST CSF: DE.CM-8, PR.IP-12 | ISO 27001: A.12.6.1, A.18.2.3


2. React/Next.js: Patch React2Shell Immediately

Why: CVSS 10.0, Chinese APT exploitation, 90,300 vulnerable instances.

How:

# Update React
npm update react@19.1.2 react-dom@19.1.2

# Update Next.js
npm update next@15.3.2

# Verify
npm ls react next

CIS 18: 7.1, 16.1 | NIST CSF: PR.IP-12, DE.CM-8 | ISO 27001: A.12.6.1, A.14.2.2


3. Veeam: Update Backup & Replication to 13.0.1.1071

Why: CVSS 9.0 RCE. Veeam is frequent ransomware target (Akira, Fog, Frag).

How: Download and install version 13.0.1.1071 from Veeam portal. Restrict Backup/Tape Operator role access.

CIS 18: 7.1, 11.4 | NIST CSF: PR.IP-12, PR.IP-4 | ISO 27001: A.12.3.1, A.12.6.1


4. Gogs: Disable Open Registration and Restrict Access

Why: Zero-day (CVE-2025-8110) with no patch. 700+ confirmed compromises.

How:

# app.ini

[service]

DISABLE_REGISTRATION = true REQUIRE_SIGNIN_VIEW = true

Place behind VPN. Monitor for 8-character random repository names.

CIS 18: 4.1, 13.4, 16.8 | NIST CSF: PR.AC-5, PR.IP-1 | ISO 27001: A.9.4.1, A.13.1.3


5. Implement Phishing-Resistant MFA (FIDO2/WebAuthn)

Why: FBI Kimsuky quishing campaigns. PhaaS kits bypass traditional MFA via session token theft.

How:

# Azure AD/Entra ID - Require FIDO2
Set-MgPolicyAuthenticationMethodPolicy -RegistrationEnforcement @{
  AuthenticationMethodsRegistrationCampaign = @{
    SnoozeDurationInDays = 0
    State = "enabled"
    IncludeTargets = @(@{Id = "all_users"; TargetType = "group"})
  }
}

CIS 18: 6.3, 6.4, 6.5 | NIST CSF: PR.AC-7, PR.AC-1 | ISO 27001: A.9.4.2, A.9.2.4


10. Threat Landscape Summary

  • BlackCat/Alphv Insiders: Two US security professionals (Ryan Goldberg, Kevin Martin) pleaded guilty January 2026. Sentencing March 12, 2026.
  • Qilin & SafePay: Active campaigns targeting US, Canada, South Korea, France, UK in manufacturing, healthcare, professional services.
  • Exfiltration-Only Attacks: Surging attacks without encryption using Azure Copy. Victims pay due to regulatory exposure.
  • 2026 Predictions: Ransomware attacks rose 47% in 2025 (7,200 vs 4,900 in 2024). First year new actors outside Russia expected to exceed those within it.

Sources: CYFIRMA | Check Point Research | Recorded Future | Cyble

Notable Incidents

  • Sedgwick Government Solutions: TridentLocker attack Dec 31, 2025 (DHS/ICE/CBP/CISA contractor)
  • Korean Air: 30,000 employees affected via vendor KC&D Service; Cl0p via Oracle E-Business Suite
  • Artisans’ Bank & VeraBank: 1.35M affected via Marquis Software vendor breach (SonicWall CVE)

11. Upcoming Security Events

DateEvent
January 14, 2026 (10:00 AM PT)Microsoft Patch Tuesday
January 19, 2026CISA KEV deadline: MongoDB CVE-2025-14847
January 28, 2026CISA KEV deadline: HPE OneView CVE-2025-37164, MS PowerPoint CVE-2009-0556
February 2, 2026CISA KEV deadline: Gogs CVE-2025-8110
March 12, 2026BlackCat insiders sentencing
June 2026Windows Secure Boot certificates begin expiring

12. Sources

Government & Regulatory:

  • CISA KEV Catalog: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
  • CISA Alerts: https://www.cisa.gov/news-events/alerts
  • FBI IC3 FLASH AC-000001-MW: https://www.ic3.gov/CSA/2026/260108.pdf
  • CISA Vulnerability Bulletin: https://www.cisa.gov/news-events/bulletins/sb26-012

Threat Intelligence:

  • Wiz Research: https://www.wiz.io/blog
  • Google Cloud Threat Intelligence: https://cloud.google.com/blog/topics/threat-intelligence
  • Microsoft Security Blog: https://www.microsoft.com/en-us/security/blog
  • Darktrace: https://www.darktrace.com/blog
  • Trend Micro Research: https://www.trendmicro.com/en_us/research
  • Rapid7 Blog: https://www.rapid7.com/blog
  • Datadog Security Labs: https://securitylabs.datadoghq.com

Security News:

  • The Hacker News: https://thehackernews.com
  • BleepingComputer: https://www.bleepingcomputer.com
  • SecurityWeek: https://www.securityweek.com
  • Security Affairs: https://securityaffairs.com
  • CyberScoop: https://cyberscoop.com
  • Dark Reading: https://www.darkreading.com

Vendor Advisories:

  • Veeam Security Advisories: https://www.veeam.com/kb4693
  • Chrome Releases: https://chromereleases.googleblog.com

Document Version: 1.0 Prepared: January 12, 2026 Next Briefing: January 19, 2026

Author

Tech Jacks Solutions

Leave a comment

Your email address will not be published. Required fields are marked *