Security Weekly: Apple 0-days, WinRAR, .NET RCE, OAuth

Security Weekly: Apple 0-days, WinRAR, .NET RCE, OAuth
December 15, 2025 at 12:00 AM

This week’s security roundup is a patch-now moment. Actively exploited flaws are hitting software most of us use daily—phones, browsers, archives, and popular frameworks.

Threat of the week

  • Apple and Google ship fixes for two zero-days: CVE-2025-14174 (ANGLE memory corruption) and CVE-2025-43529 (use-after-free). Targets include iOS, iPadOS, macOS, tvOS, watchOS, visionOS, and Safari; Chrome is impacted via ANGLE. Both bugs enable code execution via malicious web content. Exploitation appears highly targeted, likely tied to commercial spyware.

Top news highlights

  • .NET SOAPwn enables RCE via HTTP client proxies: Unexpected handling of non-HTTP URLs can lead to arbitrary file writes, NTLM challenge leaks, and RCE through web shells or PowerShell script drops. WSDL imports may also be abused.
  • CentreStack/Triofox exploited: A design failure in token encryption key generation lets attackers access web.config and execute code. Keys don’t rotate; at least nine orgs impacted as of Dec 10, 2025.
  • WinRAR CVE-2025-6218 (path traversal) under active attack: Exploited by GOFFEE (Paper Werewolf), Bitter, and Gamaredon. Added to CISA KEV; U.S. federal agencies must patch by Dec 30, 2025.
  • React2Shell (CVE-2025-55182) mass exploitation: Multiple China-nexus clusters (UNC6600, UNC6586, UNC6588, UNC6603, UNC6595) deploy malware including MINOCAT, SNOWLIGHT, COMPOOD, HISONIC, and Noodle RAT. Organizations on React/Next.js must patch fast.
  • Hamas-linked WIRTE (Ashen Lepus) expands espionage across the Middle East: Long-running phishing leads to a modular AshTag framework delivered via C2 code hidden in HTML tags; persistent operations continued through and after the 2025 Gaza ceasefire.

Trending CVEs to prioritize

  • Apple/Chrome: CVE-2025-43529, CVE-2025-14174
  • React/Next.js: CVE-2025-55183, CVE-2025-55184, CVE-2025-67779
  • WinRAR: CVE-2025-6218
  • Plus critical issues across Windows, Fortinet, Ivanti, SAP, PCIe IDE protocol, routers/cameras, Jenkins, GitLab, Apache Struts 2, and more. Triage against exposure and business impact, then patch on risk.

Around the cyber world

  • UK fines LastPass £1.2M for 2022 breach: Attackers pivoted via a compromised developer MacBook, abused Plex CVE-2020-5741 to keylog a DevOps master password, and breached cloud storage. ICO cited insufficient safeguards.
  • APT-C-60 targets Japan with SpyGlace: Phishing attaches VHDX directly; GitHub replaces Bitbucket for payload delivery.
  • ConsentFix, a new OAuth phishing twist: Victims paste a localhost URL containing an OAuth code into a fake Cloudflare challenge page, granting access—entirely within the browser, evading endpoint detections.
  • 2025 CWE Top 25: XSS leads, then SQLi, CSRF, missing authorization, and out-of-bounds write.
  • Salt Typhoon members tied to Cisco training: Findings suggest local training programs may inadvertently boost offensive capabilities if safeguards are weak.
  • Freedom Chat fixes two flaws: Possible phone-number enumeration and exposed PINs triggered a global PIN reset; no message content was exposed.
  • New Windows RasMan 0-day DoS gets unofficial 0patch: Impacts Windows 7–11 and Server 2008 R2–2025; no in-the-wild exploitation reported.
  • Ukrainian national charged over OT attacks: Linked to NoName057(16) and CARR, allegedly GRU-directed; U.S. cites opportunistic OT intrusions via exposed VNC and basic tradecraft.
  • APT36 (Transparent Tribe) targets Indian government Linux (BOSS): Spear-phishing Linux LNK files deploy a Python RAT for remote control.
  • Operation Hanoi Thief hits Vietnamese IT/HR: Fake resumes deliver LOTUSHARVEST via DLL side-loading; steals Chrome/Edge data.
  • PowerShell security boost: New prompt warns on Invoke-WebRequest without safe parameters; Microsoft rolls out Baseline Security Mode across M365 services for risk-based hardening.
  • U.S. to require foreign travelers’ 5-year social media history: Applies to all countries, including visa waiver entrants.
  • AitM phishing targets Microsoft 365/Okta: Proxies SSO to steal credentials and session tokens, bypassing non-phishing-resistant MFA.
  • Calendly-themed phishing steals Google/Facebook credentials: BitB pop-ups and brand spoofing target ad account managers to fuel malvertising and ClickFix-style campaigns.
  • Calendar subscription abuse: Hijacked/expired iCal subscription domains can push malicious events to users’ calendars; 390+ abandoned domains sinkholed.
  • The Gentlemen ransomware ramps up: Uses BYOVD and GPO manipulation in double-extortion attacks across 17 countries; one of 2025’s most active emerging crews.

Webinars to watch

  • Zero Trust + AI for modern, fileless threats and secure Dev environments.
  • Patch faster, safely: Guardrails for Chocolatey/Winget, version drift detection, and staged rollouts.

Helpful tools (review before use)

  • Strix: Lightweight framework for building consistent CLIs.
  • Heisenberg: Scans SBOMs and public sources to surface supply chain risk signals.
    Disclaimer: For research only. Review code, test safely, and follow laws/policies.

What to do now

  • Patch Apple platforms and Safari; update Chrome.
  • Update WinRAR; deploy React/Next.js fixes.
  • Audit .NET apps for SOAP/WSDL proxy behaviors; block non-HTTP schemas.
  • Harden SSO/MFA (phishing-resistant methods), monitor OAuth consent flows, and train users on ConsentFix-style lures.
  • Review calendar subscriptions; remove abandoned sources.
  • Enable new PowerShell protections and review Microsoft Baseline Security Mode.

Source: The Hacker News

Back…