Advertisement · 728 × 90

Posts by AmberWolf

ThinOS - Unencrypted Memory Dumps (CVE-2025-32752) AmberWolf Security Research Blog

Read our full analysis of the vulnerability and its potential exploitation here: blog.amberwolf.com/blog/2025/ju...

10 months ago 0 0 0 0

These core dumps may contain sensitive data and compromise the integrity of ThinOS’s storage encryption, directly contradicting Dell’s documentation, which states that all partitions except the boot partition are encrypted.

10 months ago 0 0 1 0

If the device configuration allows it, this option can be accessed by unauthenticated users. In addition, previously generated core dumps may be accessible to unauthenticated attackers.

10 months ago 0 0 1 0

AmberWolf has published technical details on CVE-2025-32752, a vulnerability affecting Dell ThinOS. Security researcher Darren McDonald discovered that when the troubleshooting feature “Create Core Dump” is used, ThinOS saves core dumps to an unencrypted partition.

10 months ago 1 0 1 0
Reproducing CVE-2024-9042: Command Injection in Windows Kubernetes Nodes AmberWolf Security Research Blog

You can read our latest blog at blog.amberwolf.com/blog/2025/ja...

1 year ago 2 0 0 0

The Kubernetes Security Response Committee has published an advisory for CVE-2024-9042, affecting Windows worker nodes querying the /logs endpoint.

Iain Smart, Principal Security Consultant at AmberWolf, reproduced the issue & shared detection insights in our latest blog.

1 year ago 3 4 1 0
Delinea Protocol Handler - Remote Code Execution via Update Process (CVE-2024-12908) AmberWolf Security Research Blog

All I want for Christmas is U(RL handlers not vulnerable to RCE)...

AmberWolf has published information about CVE-2024-12908, a Remote Code Execution vulnerability in the Delinea Secret Server Protocol Handler.

You can read our blog & PoC here:
blog.amberwolf.com/blog/2024/de...

1 year ago 3 2 0 0
Palo Alto GlobalProtect - RCE and Privilege Escalation via Malicious VPN Server (CVE-2024-5921) Palo Alto GlobalProtect - RCE and Privilege Escalation via Malicious VPN Server (CVE-2024-5921)

CVE-2024-5921 is a Remote Code Execution and Privilege Escalation vulnerability in Palo Alto Global Protect, which is also exploitable using NachoVPN. Our full technical write up is available here: blog.amberwolf.com/blog/2024/no...

1 year ago 1 0 1 1
Advertisement
SonicWall NetExtender for Windows - RCE as SYSTEM via EPC Client Update (CVE-2024-29014) SonicWall NetExtender for Windows - RCE as SYSTEM via EPC Client Update (CVE-2024-29014)

CVE-2024-29014 is an RCE as SYSTEM vulnerability in SonicWall NetExtender that is exploitable using NachoVPN. Full technical details of the vulnerability are available in out blog: blog.amberwolf.com/blog/2024/no...

1 year ago 0 0 1 0
Preview
GitHub - AmberWolfCyber/NachoVPN: A tasty, but malicious SSL-VPN server 🌮 A tasty, but malicious SSL-VPN server 🌮. Contribute to AmberWolfCyber/NachoVPN development by creating an account on GitHub.

You can get the code, the prebuilt container or contribute modules on GitHub: github.com/AmberWolfCyb...

1 year ago 0 0 1 0
Introducing NachoVPN: One VPN Server to Pwn Them All AmberWolf Security Research Blog

NachoVPN is a modular server that allows for the automatic exploitation of VPN clients when they connect. It currently supports Cisco AnyConnect, SonicWall NetExtender, Palo Alto GlobalProtect and Pulse/Ivanti Connect Secure) across a multiple platforms. blog.amberwolf.com/blog/2024/no...

1 year ago 0 0 1 0

Today, AmberWolf released two blog posts and our tool "NachoVPN" to target vulnerabilities in major VPNs, including CVE-2024-29014 (SonicWall NetExtender SYSTEM RCE) and CVE-2024-5921 (Palo Alto GlobalProtect RCE and Priv Esc), after our SANS HackFest presentation.🧵

1 year ago 6 5 1 1