After conducting a detailed analysis in February, we've compiled a list of vulnerabilities that are currently classified as trending. These represent the most dangerous security flaws, either currently being widely exploited by cybercriminals or likely to be exploited in the near future. We strongly recommend verifying whether your organization has addressed these vulnerabilities, as well as those highlighted in our previous digests.
- It's also important to address vulnerabilities that have not been mentioned in our digests, as their exploitation could cause irreparable damage to an organization.
Two high-severity vulnerabilities have been identified in Microsoft products (CVE-2025-21418 and CVE-2025-21391). The first vulnerability enables privilege escalation to SYSTEM level through a heap buffer overflow. The second allows attackers to delete target files in the system by exploiting improper handling of symbolic links and shortcuts during file operations.
The critical vulnerability CVE-2025-0108 in PAN-OS, a Palo Alto Networks product, allows attackers to bypass authentication in the web management interface through specially crafted requests. When combined with CVE-2024-9474 and CVE-2025-0111, this vulnerability could enable attackers to execute arbitrary code with root privileges, as well as extract configuration files and other sensitive information.
A critical vulnerability in the CommuniGate Pro mail server (BDU:2025-01331) could lead to arbitrary code execution through a stack buffer overflow.
Read below to learn about these vulnerabilities, how they are exploited, and mitigation strategies in this digest.