Top CVEs of December 2025
None
<p><span style="font-weight: 400;">December 2025 was a brutal reality check for security teams. While most were winding down for the holidays, threat actors weaponized a tectonic shift in the landscape, headlined by the “React2Shell” exploit. From mass web server takeovers to unauthenticated mail server compromises, the </span><b>Top CVEs of December 2025</b><span style="font-weight: 400;"> demand immediate action. Here is the breakdown of the month’s five most dangerous exploits and how to patch them.</span></p><h2><strong>1. CVE-2025-55182 | React2Shell: Unauthenticated Remote Code Execution</strong></h2><p><a href="https://vi.strobes.co/cve/CVE-2025-55182"><span style="font-weight: 400;">CVE-2025-55182</span></a><span style="font-weight: 400;">, colloquially known as </span><b>“React2Shell,”</b><span style="font-weight: 400;"> is a maximum-severity vulnerability in the React framework (specifically affecting React 19 and Next.js versions utilizing React Server Components). It allows unauthenticated remote attackers to execute arbitrary code on the underlying server by sending a specially crafted HTTP request. By exploiting a flaw in how the server handles serialized data during the “Flight” protocol handshake, attackers can achieve full system compromise. Security researchers have labeled this the “Log4Shell of the Frontend” due to the ubiquity of React in modern web infrastructure.</span></p><p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-14486" src="https://strobes.co/wp-content/uploads/2026/01/CVE-1.png" alt="Top CVEs December 2025 dashboard showing CVE-2025-55182 with exploit references, CVSS critical severity, patch availability, and Strobes priority score." width="1300" height="800" srcset="https://strobes.co/wp-content/uploads/2026/01/CVE-1.png 1300w, https://strobes.co/wp-content/uploads/2026/01/CVE-1-300x185.png 300w, https://strobes.co/wp-content/uploads/2026/01/CVE-1-1024x630.png 1024w, https://strobes.co/wp-content/uploads/2026/01/CVE-1-768x473.png 768w" sizes="(max-width: 1300px) 100vw, 1300px"></p><h3><b>Vulnerability Breakdown</b></h3><p><b>CVE-2025-55182</b><span style="font-weight: 400;"> originates from a fundamental logic error in the </span><b>React Server Components (RSC)</b><span style="font-weight: 400;"> rendering engine. To optimize performance, React uses a serialized format called the “Flight” protocol to pass state and components between the server and the client.</span></p><p><span style="font-weight: 400;">The vulnerability exists because the server-side logic responsible for reconstructing these objects fails to validate the type of functions being “revived” during deserialization. An attacker can craft a malicious JSON-like payload that mimics a legitimate component state but includes a reference to a restricted server-side module (such as </span><span style="font-weight: 400;">child_process</span><span style="font-weight: 400;">). When the React engine processes this payload to update the view, it inadvertently executes the attacker’s embedded command. Because this occurs before any custom application-level authentication middleware is typically triggered, the exploit is fully unauthenticated.</span></p><h3><b>Impact of Exploitation</b></h3><p><span style="font-weight: 400;">If an attacker successfully exploits React2Shell, the consequences are catastrophic:</span></p><ul> <li style="font-weight: 400;" aria-level="1"><b>Full Server Takeover:</b><span style="font-weight: 400;"> The attacker gains the ability to execute shell commands with the same privileges as the web server process (e.g., </span><span style="font-weight: 400;">www-data</span><span style="font-weight: 400;"> or </span><span style="font-weight: 400;">node</span><span style="font-weight: 400;">).</span></li> <li style="font-weight: 400;" aria-level="1"><b>Secrets Exfiltration:</b><span style="font-weight: 400;"> Access to the server environment allows for the theft of </span><span style="font-weight: 400;">.env</span><span style="font-weight: 400;"> files, database credentials, API keys, and cloud provider metadata tokens.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Supply Chain Injection:</b><span style="font-weight: 400;"> Attackers can modify the application source code or inject malicious scripts directly into the frontend delivered to all visiting users.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Lateral Movement:</b> From the compromised web server, attackers often pivot into the internal VPC, targeting databases and internal microservices</li> </ul><h3><b>Mitigation & Patching</b></h3><table> <tbody> <tr> <td><b>Mitigation Step</b></td> <td><b>Status / Action</b></td> </tr> <tr> <td><b>Patch Availability</b></td> <td><b>Immediate.</b><span style="font-weight: 400;"> Update to React 19.0.1+ or Next.js 15.1.0+ (or the backported 14.x security releases).</span></td> </tr> <tr> <td><b>Exploit Activity</b></td> <td><b>Extremely High.</b><span style="font-weight: 400;"> Proof-of-Concept (PoC) code is public, and mass-scanning for vulnerable </span><span style="font-weight: 400;">/</span><span style="font-weight: 400;"> and </span><span style="font-weight: 400;">/_next/data</span><span style="font-weight: 400;"> endpoints is ongoing.</span></td> </tr> <tr> <td><b>Immediate Workaround</b></td> <td><span style="font-weight: 400;">If patching is impossible, use a Web Application Firewall (WAF) to inspect and block requests containing serialized RSC headers (e.g., </span><span style="font-weight: 400;">RSC: 1</span><span style="font-weight: 400;">) with suspicious payloads.</span></td> </tr> <tr> <td><b>Hardening Tip</b></td> <td><span style="font-weight: 400;">Ensure your Node.js process is running with the least privilege possible and utilize a hardened container image with a read-only filesystem.</span></td> </tr> <tr> <td><b>Detection</b></td> <td><span style="font-weight: 400;">Monitor server logs for unusual </span><span style="font-weight: 400;">POST</span><span style="font-weight: 400;"> or </span><span style="font-weight: 400;">GET</span><span style="font-weight: 400;"> requests to RSC-enabled routes that contain high-density encoded characters or references to system-level modules.</span></td> </tr> <tr> <td><b>Hunt Suggestions</b></td> <td><span style="font-weight: 400;">Search for unexpected outbound network connections from your web tier, particularly to known C2 (Command & Control) IPs or common cryptomining pools.</span></td> </tr> </tbody> </table><h3><b>Why is this CVE in Our Top Picks of the Month?</b></h3><p><span style="font-weight: 400;">CVE-2025-55182 is our top pick because it targets the very foundation of the modern web. React is the most popular frontend library in the world, and the shift toward </span><b>Server Components</b><span style="font-weight: 400;"> means that vulnerabilities that were once “client-side only” have now moved to the server. The “zero-click” and unauthenticated nature of this exploit makes it a dream for threat actors. Its inclusion in the December 2025 threat landscape signals a paradigm shift in how we must secure JavaScript-based infrastructure.</span></p><h3><b>Strobes Recommendation</b></h3><ul> <li style="font-weight: 400;" aria-level="1"><b>Identify:</b><span style="font-weight: 400;"> Use an SCA (Software Composition Analysis) tool to identify every instance of React 19 and Next.js in your environment.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Patch:</b><span style="font-weight: 400;"> This is a “Tier 0” priority. Deploy the patched versions of your framework immediately.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Rotate:</b><span style="font-weight: 400;"> Treat all environment variables on vulnerable servers as compromised. Rotate all database passwords and API keys immediately after patching.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Verify:</b><span style="font-weight: 400;"> Conduct a post-incident scan to ensure no web shells or “Shadow” admin accounts were left behind by automated exploit scripts.</span></li> </ul><h3><b>Bottomline</b></h3><p><b>A critical, unauthenticated RCE in the world’s most popular web framework.</b><span style="font-weight: 400;"> This is not a drill. If you use React Server Components, you must patch today. Failure to do so leaves your entire server environment open to automated takeover and data exfiltration.</span></p><h2><strong>2. CVE-2025-66516 | Apache Tika Unauthenticated XXE and SSRF Vulnerability</strong></h2><p><a href="https://vi.strobes.co/cve/CVE-2025-66516"><span style="font-weight: 400;">CVE-2025-66516</span></a><span style="font-weight: 400;"> is a critical vulnerability in </span><b>Apache Tika</b><span style="font-weight: 400;"> (specifically affecting core and PDF parsing components) that allows unauthenticated remote attackers to trigger a </span><b>Server-Side Request Forgery (SSRF)</b><span style="font-weight: 400;"> or </span><b>XML External Entity (XXE) injection</b><span style="font-weight: 400;">. By submitting a specially crafted document for parsing, an attacker can force the server to disclose local system files or interact with internal network resources that are otherwise shielded from the public internet. Given Apache Tika’s role as the “gold standard” for content detection and extraction in enterprise search engines, document management systems, and mail gateways, the vulnerability poses a massive “hidden” risk to the global software supply chain.</span></p><p><img decoding="async" class="aligncenter size-full wp-image-14487" src="https://strobes.co/wp-content/uploads/2026/01/CVE-2.png" alt="Top CVEs December 2025 view showing CVE-2025-66516 with critical CVSS score, exploit references, patch availability, and Strobes priority score." width="1300" height="800" srcset="https://strobes.co/wp-content/uploads/2026/01/CVE-2.png 1300w, https://strobes.co/wp-content/uploads/2026/01/CVE-2-300x185.png 300w, https://strobes.co/wp-content/uploads/2026/01/CVE-2-1024x630.png 1024w, https://strobes.co/wp-content/uploads/2026/01/CVE-2-768x473.png 768w" sizes="(max-width: 1300px) 100vw, 1300px"></p><h3><b>Vulnerability Breakdown</b></h3><p><span style="font-weight: 400;">CVE-2025-66516 stems from the default configuration of the XML parsers used within Apache Tika’s PDF and metadata extraction modules. When the system processes a document containing malicious XML content, it fails to disable the resolution of external entities.</span></p><p><span style="font-weight: 400;">An attacker can embed an external entity reference within a document (such as a PDF or an XML-based Office file). When Tika attempts to “extract” the text or metadata, the underlying parser follows the external reference. This can lead to the server reading local files (e.g., </span><span style="font-weight: 400;">/etc/passwd</span><span style="font-weight: 400;"> or configuration files containing cloud metadata secrets) and sending the contents back to the attacker. Furthermore, because Tika often sits deep within a “trusted” zone of a corporate network, it can be used as a pivot point to scan internal ports or attack internal APIs that do not require authentication from internal IPs.</span></p><h3><b>Impact of Exploitation</b></h3><p><span style="font-weight: 400;">If an attacker succeeds, likely outcomes include:</span></p><ul> <li style="font-weight: 400;" aria-level="1"><b>Sensitive Data Exfiltration:</b><span style="font-weight: 400;"> Attackers can read sensitive files from the host server, including credentials, SSH keys, and environmental variables.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Internal Network Reconnaissance:</b><span style="font-weight: 400;"> The Tika server can be forced to map the internal network, identifying internal databases and administration panels.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Cloud Credential Theft:</b><span style="font-weight: 400;"> In cloud environments (AWS/Azure/GCP), attackers can query the Instance Metadata Service (IMDS) to steal temporary security tokens, leading to full cloud environment takeover.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Service Disruption:</b> Maliciously crafted “billion laughs” XML payloads can cause a Denial of Service (DoS) by exhausting the server’s CPU and memory resources.</li> </ul><h3><b>Mitigation & Patching</b></h3><table> <tbody> <tr> <td><b>Mitigation Step</b></td> <td><b>Status / Action</b></td> </tr> <tr> <td><b>Patch Availability</b></td> <td><span style="font-weight: 400;">Upgrade to </span><b>Apache Tika 3.0.1</b><span style="font-weight: 400;"> or higher immediately. This version disables external entity resolution by default across all parsing modules.</span></td> </tr> <tr> <td><b>Exploit Activity</b></td> <td><b>High.</b><span style="font-weight: 400;"> Security researchers have published PoCs (Proof of Concept), and automated scanners are actively testing document upload portals for this vulnerability.</span></td> </tr> <tr> <td><b>Immediate Workaround</b></td> <td><span style="font-weight: 400;">If patching is delayed, configure your Web Application Firewall (WAF) to inspect file uploads for XML signatures (</span><span style="font-weight: 400;"><!ENTITY</span><span style="font-weight: 400;">) and block suspicious document types.</span></td> </tr> <tr> <td><b>Hardening Tip</b></td> <td><span style="font-weight: 400;">Run Tika in a highly restricted container with no outbound internet access and limited access to the local filesystem (Read-Only).</span></td> </tr> <tr> <td><b>Detection</b></td> <td><span style="font-weight: 400;">Monitor system logs for unexpected outbound network connections from the Tika service, especially to internal IP ranges or cloud metadata IP (</span><span style="font-weight: 400;">169.254.169.254</span><span style="font-weight: 400;">).</span></td> </tr> <tr> <td><b>Hunt Suggestions</b></td> <td><span style="font-weight: 400;">Search for unusual file access patterns originating from the Tika process. Audit your document processing pipeline for any “failed” parsing jobs that coincide with high CPU spikes.</span></td> </tr> </tbody> </table><h3><b>Why is this CVE in Our Top Picks of the Month?</b></h3><p><span style="font-weight: 400;">CVE-2025-66516 is a “silent killer” because Apache Tika is rarely a standalone product; it is a library embedded in thousands of other applications. Organizations may not even realize they are running Tika until it is exploited. Its </span><b>CVSS 10.0</b><span style="font-weight: 400;"> rating and the ease of exploitation—simply uploading a file to a resume portal, a cloud storage bucket, or a CRM—make it a primary target for ransomware groups looking for an initial foothold in the enterprise.</span></p><h3><b>Strobes Recommendation</b></h3><ol> <li style="font-weight: 400;" aria-level="1"><b>Inventory:</b><span style="font-weight: 400;"> Use an SBOM (Software Bill of Materials) tool to identify every application in your environment that utilizes the Apache Tika library.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Patch:</b><span style="font-weight: 400;"> Prioritize patching of Tika-server instances and applications that accept public document uploads.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Network Segregation:</b><span style="font-weight: 400;"> Ensure document-parsing workers are isolated in a DMZ or a “sandbox” VPC with zero egress to the internal network.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Rotate Secrets:</b><span style="font-weight: 400;"> If you suspect an SSRF attack has occurred, immediately rotate all cloud IAM roles and service account tokens associated with the affected server.</span></li> </ol><h3><b>Bottomline</b></h3><p><span style="font-weight: 400;">A critical, easily triggered XXE/SSRF vulnerability in a ubiquitous document-parsing library. Because Tika is often a sub-component of larger systems, this is a </span><b>high-priority supply chain event</b><span style="font-weight: 400;">. Failure to patch or isolate the parser could lead to a total leak of server secrets and a breach of the internal network.</span></p><h2><strong>3. CVE-2025-52691 | SmarterTools SmarterMail Unauthenticated Arbitrary File Upload</strong></h2><p><b>CVE-2025-52691</b><span style="font-weight: 400;"> is a critical vulnerability in </span><b>SmarterTools SmarterMail</b><span style="font-weight: 400;"> (affecting Build 9406 and earlier) that allows unauthenticated remote attackers to bypass security controls and achieve Remote Code Execution (RCE). By exploiting an insecure file upload mechanism, attackers can plant malicious web shells on the server, effectively seizing control of the organization’s email infrastructure. SmarterTools released an emergency update in late December 2025 following reports from the Cyber Security Agency of Singapore (CSA) regarding the flaw’s potential for mass exploitation.</span></p><p><img decoding="async" class="aligncenter size-full wp-image-14488" src="https://strobes.co/wp-content/uploads/2026/01/CVE-3.png" alt="Top CVEs December 2025 snapshot highlighting CVE-2025-52691 with critical severity, exploit references, patch status, and Strobes priority score. " width="1300" height="800" srcset="https://strobes.co/wp-content/uploads/2026/01/CVE-3.png 1300w, https://strobes.co/wp-content/uploads/2026/01/CVE-3-300x185.png 300w, https://strobes.co/wp-content/uploads/2026/01/CVE-3-1024x630.png 1024w, https://strobes.co/wp-content/uploads/2026/01/CVE-3-768x473.png 768w" sizes="(max-width: 1300px) 100vw, 1300px"></p><h3><b>Vulnerability Breakdown</b></h3><p><span style="font-weight: 400;">CVE-2025-52691 stems from a failure in the application’s attachment handling and temporary file management logic. The SmarterMail web interface allows users to upload files for various purposes (attachments, profile images, etc.); however, the server fails to properly sanitize the destination path or validate the file extension during specific unauthenticated API calls.</span></p><p><span style="font-weight: 400;">An attacker can craft a multi-part POST request that leverages directory traversal sequences (e.g., </span><span style="font-weight: 400;">../../</span><span style="font-weight: 400;">) to escape the intended “temp” directory. By doing so, they can write an executable file—such as an </span><span style="font-weight: 400;">.aspx</span><span style="font-weight: 400;"> web shell—directly into the web root or a startup folder. Since the vulnerability exists in a pre-authentication routine, the attacker does not need a valid mailbox or login credentials to execute this “write-what-where” primitive.</span></p><h3><b>Impact of Exploitation</b></h3><p><span style="font-weight: 400;">If an attacker succeeds, likely outcomes include:</span></p><ul> <li style="font-weight: 400;" aria-level="1"><b>Complete Server Takeover:</b><span style="font-weight: 400;"> The attacker gains the same privileges as the SmarterMail service (often SYSTEM or Network Service), allowing for full control of the host OS.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Email Exfiltration:</b><span style="font-weight: 400;"> Unauthorized access to all stored emails, attachments, and contact lists across all domains hosted on the server.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Business Email Compromise (BEC):</b><span style="font-weight: 400;"> Attackers can send legitimate-looking emails from internal accounts to facilitate wire fraud or distribute malware to partners.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Ransomware Gateway:</b> Historically, vulnerabilities in mail servers are used as the initial entry point to deploy file-encrypting ransomware across the broader corporate network.</li> </ul><h3><b>Mitigation & Patching</b></h3><table> <tbody> <tr> <td><b>Mitigation Step</b></td> <td><b>Status / Action</b></td> </tr> <tr> <td><b>Patch Availability</b></td> <td><b>Apply SmarterMail Build 9413 or later.</b><span style="font-weight: 400;"> Build 9483 (Dec 18, 2025) is recommended for the most stable and secure experience.</span></td> </tr> <tr> <td><b>Exploit Activity</b></td> <td><b>Critical Monitor.</b><span style="font-weight: 400;"> While initially reported via responsible disclosure, the ease of exploitation has led to widespread scanning by IABs (Initial Access Brokers).</span></td> </tr> <tr> <td><b>Immediate Workaround</b></td> <td><span style="font-weight: 400;">Restrict access to the SmarterMail Web UI via IP whitelisting or VPN. Disable “Anonymous” file upload features in the admin settings if possible.</span></td> </tr> <tr> <td><b>Hardening Tip</b></td> <td><span style="font-weight: 400;">Ensure the SmarterMail service is running with the least privileges necessary. Use a dedicated service account rather than NT AUTHORITY\SYSTEM.</span></td> </tr> <tr> <td><b>Detection</b></td> <td><span style="font-weight: 400;">Scan the </span><span style="font-weight: 400;">\SmarterMail\Service\</span><span style="font-weight: 400;"> and </span><span style="font-weight: 400;">\SmarterMail\MRS\</span><span style="font-weight: 400;"> directories for unexpected </span><span style="font-weight: 400;">.aspx</span><span style="font-weight: 400;">, </span><span style="font-weight: 400;">.ashx</span><span style="font-weight: 400;">, or </span><span style="font-weight: 400;">.php</span><span style="font-weight: 400;"> files created recently.</span></td> </tr> <tr> <td><b>Hunt Suggestions</b></td> <td><span style="font-weight: 400;">Search IIS logs for </span><span style="font-weight: 400;">POST</span><span style="font-weight: 400;"> requests to upload endpoints that return a </span><span style="font-weight: 400;">200 OK,</span><span style="font-weight: 400;"> followed by immediate </span><span style="font-weight: 400;">GET</span><span style="font-weight: 400;"> requests to new files in unconventional directories.</span></td> </tr> </tbody> </table><h3><b>Why is this CVE in Our Top Picks of the Month?</b></h3><p><span style="font-weight: 400;">CVE-2025-52691 is a standout risk because it targets the </span><b>primary communication hub</b><span style="font-weight: 400;"> of an enterprise. Unlike many vulnerabilities that require a foothold inside the network, this is a “front-door” exploit. The combination of a </span><b>10.0 CVSS score</b><span style="font-weight: 400;"> and the fact that mail servers </span><i><span style="font-weight: 400;">must</span></i><span style="font-weight: 400;"> be internet-facing makes it a perfect target. Its disclosure just before the holiday season follows the pattern of “Log4Shell” and “ProxyLogon,” where attackers capitalize on reduced IT staffing during the break.</span></p><h3><b>Strobes Recommendation</b></h3><ul> <li style="font-weight: 400;" aria-level="1"><b>Emergency Update:</b><span style="font-weight: 400;"> Update SmarterMail to Build 9413 or higher immediately. This should be treated as an out-of-band security emergency.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Integrity Check:</b><span style="font-weight: 400;"> Perform a file integrity check of your web directories. Look specifically for files created in the last 30 days that do not match the standard installation manifest.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Review API Logs:</b><span style="font-weight: 400;"> Inspect logs for unusual activity involving the </span><span style="font-weight: 400;">System Admin</span><span style="font-weight: 400;"> or </span><span style="font-weight: 400;">File Upload</span><span style="font-weight: 400;"> API endpoints from unknown external IPs.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Monitor SMTP Traffic:</b><span style="font-weight: 400;"> Watch for sudden spikes in outbound mail volume, which could indicate the server is being used as a spam relay or for internal phishing.</span></li> </ul><h3><b>Bottomline</b></h3><p><span style="font-weight: 400;">This is an </span><b>unauthenticated RCE</b><span style="font-weight: 400;"> on a critical infrastructure component. If you run SmarterMail and have not updated since mid-December 2025, you should assume a high probability of compromise and initiate a forensic review alongside your patching efforts.</span></p><h2><strong>4. CVE-2025-36918 | Windows MSHTML Platform Remote Code Execution Vulnerability</strong></h2><p><a href="https://vi.strobes.co/cve/CVE-2025-36918"><span style="font-weight: 400;">CVE-2025-36918</span></a><span style="font-weight: 400;"> is a critical remote code execution (RCE) vulnerability in the </span><b>Windows MSHTML engine</b><span style="font-weight: 400;">, a core component used by various applications, including Microsoft Office and Outlook, to render web-based content. This flaw allows unauthenticated attackers to execute arbitrary code on a target system by tricking a user into opening a specially crafted file or visiting a malicious website. Microsoft issued an emergency security update in December 2025 following reports of this vulnerability being utilized in high-precision spear-phishing campaigns against government and financial institutions.</span></p><p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-14489" src="https://strobes.co/wp-content/uploads/2026/01/CVE-4.png" alt="Top CVEs December 2025 overview showing CVE-2025-36918 with high severity rating, patch availability, exploit status, and Strobes priority score." width="1300" height="800" srcset="https://strobes.co/wp-content/uploads/2026/01/CVE-4.png 1300w, https://strobes.co/wp-content/uploads/2026/01/CVE-4-300x185.png 300w, https://strobes.co/wp-content/uploads/2026/01/CVE-4-1024x630.png 1024w, https://strobes.co/wp-content/uploads/2026/01/CVE-4-768x473.png 768w" sizes="auto, (max-width: 1300px) 100vw, 1300px"></p><h3><b>Vulnerability Breakdown</b></h3><p><span style="font-weight: 400;">CVE-2025-36918 is rooted in a “Use-After-Free” (UAF) condition within the MSHTML (Trident) engine’s processing of CSS property inheritance. When the engine parses a maliciously crafted HTML document containing nested style elements, it fails to properly manage memory pointers during the rendering phase.</span></p><p><span style="font-weight: 400;">An attacker can exploit this by hosting a malicious website or sending an email containing an embedded HTML object. When the victim’s system attempts to render the content, the MSHTML engine accesses a memory location that has already been deallocated. This memory corruption allows the attacker to hijack the execution flow of the host application (like </span><span style="font-weight: 400;">Outlook.exe</span><span style="font-weight: 400;"> or </span><span style="font-weight: 400;">Explorer.exe</span><span style="font-weight: 400;">) and execute a payload in the context of the current user. Because MSHTML is integrated deeply into the Windows shell, this exploit bypasses many traditional browser-based sandboxes.</span></p><h3><b>Impact of Exploitation</b></h3><p><span style="font-weight: 400;">If an attacker succeeds, likely outcomes include:</span></p><ul> <li style="font-weight: 400;" aria-level="1"><b>Full System Compromise:</b><span style="font-weight: 400;"> Attackers gain the ability to install programs, view or change data, and create new accounts with full user rights.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Stealthy Lateral Movement:</b><span style="font-weight: 400;"> Since the exploit often runs within trusted processes like Outlook, it can be used to harvest local credentials and move through the network undetected.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Ransomware Deployment:</b><span style="font-weight: 400;"> The vulnerability serves as an ideal “dropper” for secondary payloads, including infostealers and ransomware encryptors.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Data Exfiltration:</b> Immediate access to the victim’s documents, emails, and saved browser passwords without requiring administrative escalation.</li> </ul><h3><b>Mitigation & Patching</b></h3><table> <tbody> <tr> <td><b>Mitigation Step</b></td> <td><b>Status / Action</b></td> </tr> <tr> <td><b>Patch Availability</b></td> <td><b>Apply the Windows December 2025 Cumulative Update</b><span style="font-weight: 400;"> immediately. This addresses the memory handling logic in </span><span style="font-weight: 400;">mshtml.dll</span><span style="font-weight: 400;">.</span></td> </tr> <tr> <td><b>Exploit Activity</b></td> <td><b>Very High.</b><span style="font-weight: 400;"> Active exploitation has been confirmed by multiple threat intelligence feeds, primarily via malicious </span><span style="font-weight: 400;">.docx</span><span style="font-weight: 400;"> and </span><span style="font-weight: 400;">.rtf</span><span style="font-weight: 400;"> attachments.</span></td> </tr> <tr> <td><b>Immediate Workaround</b></td> <td><span style="font-weight: 400;">Disable the rendering of HTML emails in Outlook (View as Plain Text) and restrict the opening of Office documents from untrusted external sources.</span></td> </tr> <tr> <td><b>Hardening Tip</b></td> <td><span style="font-weight: 400;">Use Windows Defender Application Guard or similar containerization tools to isolate office applications from the rest of the operating system.</span></td> </tr> <tr> <td><b>Detection</b></td> <td><span style="font-weight: 400;">Monitor for unusual child processes spawned by </span><span style="font-weight: 400;">Outlook.exe</span><span style="font-weight: 400;"> or </span><span style="font-weight: 400;">Winword.exe</span><span style="font-weight: 400;"> (e.g., </span><span style="font-weight: 400;">cmd.exe</span><span style="font-weight: 400;">, </span><span style="font-weight: 400;">powershell.exe</span><span style="font-weight: 400;">, or </span><span style="font-weight: 400;">certutil.exe</span><span style="font-weight: 400;">).</span></td> </tr> <tr> <td><b>Hunt Suggestions</b></td> <td><span style="font-weight: 400;">Search telemetry for crashes in </span><span style="font-weight: 400;">mshtml.dll</span><span style="font-weight: 400;"> or </span><span style="font-weight: 400;">edgehtml.dll,</span><span style="font-weight: 400;"> followed by unexpected network connections to unknown IP addresses.</span></td> </tr> </tbody> </table><h3><b>Why is this CVE in Our Top Picks of the Month?</b></h3><p><span style="font-weight: 400;">CVE-2025-36918 represents a massive “attack surface” risk because the MSHTML engine remains a legacy dependency for many enterprise applications, even those not using Internet Explorer. The ability to trigger RCE via the Outlook </span><b>Preview Pane</b><span style="font-weight: 400;"> makes this a “one-click” or “zero-click” threat, which is highly effective during holiday periods when users are more likely to interact with urgent-looking emails. Its inclusion in the </span><b>CISA KEV</b><span style="font-weight: 400;"> catalog underscores the reality that this is not a theoretical threat, but a weaponized one.</span></p><h3><b>Strobes Recommendation</b></h3><ul> <li style="font-weight: 400;" aria-level="1"><b>Prioritize Workstations:</b><span style="font-weight: 400;"> Deploy the December cumulative update to all end-user workstations first, as these are the primary targets for phishing.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Enable Attack Surface Reduction (ASR):</b><span style="font-weight: 400;"> Configure ASR rules to “Block all Office applications from creating child processes.”</span></li> <li style="font-weight: 400;" aria-level="1"><b>Scan Attachments:</b><span style="font-weight: 400;"> Update email gateway signatures to detect the specific CSS/HTML patterns associated with this MSHTML exploit.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Audit Logs:</b><span style="font-weight: 400;"> Review Windows Error Reporting (WER) logs for repeated crashes in web-rendering DLLs over the last 14 days.</span></li> </ul><h3><b>Bottomline</b></h3><p><span style="font-weight: 400;">This is a </span><b>critical, weaponized RCE</b><span style="font-weight: 400;"> targeting the core of the Windows ecosystem. It turns simple document viewing into a system-level breach. If your organization relies on Microsoft 365 or Windows-based endpoints, patching this vulnerability is the single most important action to take before the 2025 holiday break.</span></p><h2><strong>CVE-2025-68615 | Net-SNMP snmptrapd Remote Stack-Based Buffer Overflow</strong></h2><p><a href="https://vi.strobes.co/cve/CVE-2025-68615"><span style="font-weight: 400;">CVE-2025-68615</span></a><span style="font-weight: 400;"> is a critical vulnerability in the </span><b>Net-SNMP</b><span style="font-weight: 400;"> package (specifically the </span><span style="font-weight: 400;">snmptrapd</span><span style="font-weight: 400;"> daemon) that allows unauthenticated remote attackers to execute arbitrary code or cause a permanent Denial of Service (DoS) via a single malformed UDP packet. By sending a specifically crafted SNMP Trap message with an oversized OID (Object Identifier) or Variable Binding, attackers can trigger a stack-based buffer overflow, gaining control over the instruction pointer on the host system. This vulnerability has seen a surge in exploit attempts targeting Linux-based networking equipment and IoT gateways throughout December 2025.</span></p><p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-14490" src="https://strobes.co/wp-content/uploads/2026/01/CVE-5.png" alt="Top CVEs December 2025 snapshot highlighting CVE-2025-68615 with critical severity, exploit reference, patch status, and Strobes priority score." width="1300" height="800" srcset="https://strobes.co/wp-content/uploads/2026/01/CVE-5.png 1300w, https://strobes.co/wp-content/uploads/2026/01/CVE-5-300x185.png 300w, https://strobes.co/wp-content/uploads/2026/01/CVE-5-1024x630.png 1024w, https://strobes.co/wp-content/uploads/2026/01/CVE-5-768x473.png 768w" sizes="auto, (max-width: 1300px) 100vw, 1300px"></p><h3><b>Vulnerability Breakdown</b></h3><p><span style="font-weight: 400;">CVE-2025-68615 stems from inadequate bounds checking within the </span><span style="font-weight: 400;">snmp_parse_varbind</span><span style="font-weight: 400;"> function used by the </span><span style="font-weight: 400;">snmptrapd</span><span style="font-weight: 400;"> service. When processing incoming Trap messages, the daemon fails to validate the length of data mapped to specific internal buffers before copying it into the stack.</span></p><p><span style="font-weight: 400;">An attacker can transmit a UDP packet to port 162 containing an ASN.1 encoded SNMP Trap with a deeply nested or excessively long variable binding. This overflows the allocated buffer memory, allowing the attacker to overwrite the return address of the function. Because </span><span style="font-weight: 400;">snmptrapd</span><span style="font-weight: 400;"> often runs with root or high-level system privileges to manage network events, a successful exploit provides the attacker with full administrative control over the underlying Linux or Unix host.</span></p><h3><b>Impact of Exploitation</b></h3><p><span style="font-weight: 400;">If an attacker succeeds, likely outcomes include:</span></p><ul> <li style="font-weight: 400;" aria-level="1"><b>Remote Code Execution (RCE):</b><span style="font-weight: 400;"> Attackers can deploy persistent backdoors or reverse shells directly into the core network monitoring infrastructure.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Infrastructure Blindness:</b><span style="font-weight: 400;"> By crashing the Trap daemon or taking control of it, attackers can suppress legitimate security alerts from other network devices, masking a larger attack.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Lateral Movement:</b><span style="font-weight: 400;"> Monitoring servers often have trusted access to the rest of the management network; a compromise here serves as a perfect pivot point for targeting the entire data center.</span></li> <li style="font-weight: 400;" aria-level="1"><b>IoT Botnet Recruitment:</b> Since Net-SNMP is embedded in millions of edge devices, this CVE is highly attractive for large-scale botnet operators.</li> </ul><h3><b>Mitigation & Patching</b></h3><table> <tbody> <tr> <td><b>Mitigation Step</b></td> <td><b>Status / Action</b></td> </tr> <tr> <td><b>Patch Availability</b></td> <td><b>Update Net-SNMP to version 5.9.5 or apply the backported vendor patch.</b><span style="font-weight: 400;"> Most Linux distributions (Ubuntu, RHEL, Debian) released security advisories on Dec 12, 2025.</span></td> </tr> <tr> <td><b>Exploit Activity</b></td> <td><b>High.</b><span style="font-weight: 400;"> Public proof-of-concept (PoC) code has been integrated into automated scanning frameworks, targeting exposed industrial control systems (ICS).</span></td> </tr> <tr> <td><b>Immediate Workaround</b></td> <td><span style="font-weight: 400;">If patching is not possible, disable the </span><span style="font-weight: 400;">snmptrapd</span><span style="font-weight: 400;"> service if not strictly required, or implement strict ACLs to only allow SNMP traffic from known, trusted IP addresses.</span></td> </tr> <tr> <td><b>Hardening Tip</b></td> <td><span style="font-weight: 400;">Enable </span><b>ASLR</b><span style="font-weight: 400;"> (Address Space Layout Randomization) and </span><b>DEP</b><span style="font-weight: 400;"> (Data Execution Prevention). Use a non-root user to run the SNMP daemon if your configuration allows.</span></td> </tr> <tr> <td><b>Detection</b></td> <td><span style="font-weight: 400;">Monitor system logs for </span><span style="font-weight: 400;">snmptrapd</span><span style="font-weight: 400;"> segmentation faults or unexpected crashes. Check for unusual binary executions originating from the SNMP service process.</span></td> </tr> <tr> <td><b>Hunt Suggestions</b></td> <td><span style="font-weight: 400;">Use network-level monitoring to identify unusually large UDP packets (exceeding 1500 bytes) directed at port 162. Search for “0x41414141” (A’s) patterns in packet payloads.</span></td> </tr> </tbody> </table><h3><b>Why is this CVE in Our Top Picks of the Month?</b></h3><p><span style="font-weight: 400;">CVE-2025-68615 represents a “Foundation-level” risk. Net-SNMP is one of the most widely deployed open-source libraries in the world, found in everything from enterprise servers to smart power grids. The ability to achieve unauthenticated RCE via a connectionless protocol (UDP) makes this extremely easy to weaponize at scale. As organizations closed for the holiday season in late 2025, this vulnerability became a primary target for “quiet” infiltration into critical management segments.</span></p><h3><b>Strobes Recommendation</b></h3><ul> <li style="font-weight: 400;" aria-level="1"><b>Update Now:</b><span style="font-weight: 400;"> Prioritize patching for all internet-facing gateways and core monitoring servers (Zabbix, Nagios, SolarWinds instances utilizing Net-SNMP).</span></li> <li style="font-weight: 400;" aria-level="1"><b>Filter Traffic:</b><span style="font-weight: 400;"> Ensure that UDP port 162 is blocked at the perimeter and only accessible via a secure management VPN.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Verify Integrity:</b><span style="font-weight: 400;"> Audit all scripts and binaries in </span><span style="font-weight: 400;">/usr/sbin/</span><span style="font-weight: 400;"> and </span><span style="font-weight: 400;">/tmp/</span><span style="font-weight: 400;"> for unauthorized modifications if the SNMP service has recently restarted unexpectedly.</span></li> <li style="font-weight: 400;" aria-level="1"><b>Rotate Community Strings:</b><span style="font-weight: 400;"> If a compromise is suspected, consider all SNMP community strings (v1/v2c) and v3 credentials compromised and initiate a rotation.</span></li> </ul><h3><b>Bottomline</b></h3><p><span style="font-weight: 400;">Critical, remotely exploitable buffer overflow in a ubiquitous network service. This is a high-priority event for any organization managing Linux infrastructure or IoT devices. A failure to secure the SNMP daemon could result in a silent takeover of your network monitoring and management plane.</span></p><h2><span style="font-weight: 400;">Final Take</span></h2><p><span style="font-weight: 400;">The </span><b>Top CVEs of December 2025</b><span style="font-weight: 400;"> prove that threat actors are shifting focus toward the core building blocks of modern infrastructure. Between the massive blast radius of React2Shell and the hidden supply chain risks in Apache Tika, the perimeter is no longer a physical line. It is now every line of code in your environment.</span></p><p><span style="font-weight: 400;">Don’t let your security strategy rely on yesterday’s headlines. Shift from reactive patching to proactive intelligence by surfacing breaking CVEs, live exploit activity, and shifting risk scores the second they trigger on the</span><a href="https://vi.strobes.co/"><span style="font-weight: 400;"> Strobes VI Platform</span></a><span style="font-weight: 400;">.</span></p><p>The post <a rel="nofollow" href="https://strobes.co/blog/top-cves-of-december-2025/">Top CVEs of December 2025</a> appeared first on <a rel="nofollow" href="https://strobes.co/">Strobes Security</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/01/top-cves-of-december-2025/" data-a2a-title="Top CVEs of December 2025"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Ftop-cves-of-december-2025%2F&linkname=Top%20CVEs%20of%20December%202025" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Ftop-cves-of-december-2025%2F&linkname=Top%20CVEs%20of%20December%202025" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Ftop-cves-of-december-2025%2F&linkname=Top%20CVEs%20of%20December%202025" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Ftop-cves-of-december-2025%2F&linkname=Top%20CVEs%20of%20December%202025" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Ftop-cves-of-december-2025%2F&linkname=Top%20CVEs%20of%20December%202025" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://strobes.co">Strobes Security</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Shubham Jha">Shubham Jha</a>. Read the original post at: <a href="https://strobes.co/blog/top-cves-of-december-2025/">https://strobes.co/blog/top-cves-of-december-2025/</a> </p>