MITRE Caldera security suite scores perfect 10 for insecurity
(2025/02/25)
- Reference: 1740516423
- News link: https://www.theregister.co.uk/2025/02/25/10_bug_mitre_caldera/
- Source link:
The smart cookie who discovered a perfect 10-out-of-10-severity remote code execution (RCE) bug in MITRE's Caldera security training platform has urged users to "immediately pull down the latest version." As in, download it and install it.
Tracked as [1]CVE-2025-27364 , the max-severity vulnerability affects all versions of Caldera, including the very first ones released back in 2017, bar the latest fixed versions: 5.1.0+, or whatever's in the master source branch.
[2]Caldera began as a research project in 2015 before launching as a fully fledged adversary emulation platform. Today, the open source project is relied upon by red and blue teams to simulate attacks and breaches, and develop organizational defenses. In reality, the suite itself can be remotely hijacked.
[3]
To make matters worse, the RCE flaw can be triggered "in most default configurations," according to Dawid Kulikowski, who found and reported the hole. An attacker can only achieve RCE when [4]Go , [5]Python , and the GNU Compiler Collection (GCC) are installed on the target device, though all three dependencies are required for Caldera to be fully functional.
Speaking of vulnerabilities, researcher Mickey Jin has published two privilege-escalation exploits that can be used against Parallels Desktop for Mac to gain local root access.
CVE-2024-34331 was disclosed and "patched" by Parallels in May 2024. Since then, using various versions, Jin has found ways of bypassing the vendor's fixes. It's worth reading [6]his write-up to fully understand the confusion here and his frustration throughout the process.
It all culminated in months of poor communication from Parallels, the researcher claims, which Jin said led him to publish the exploits online last week.
Parallels told The Register it's working on hotfixes to address the issues for Intel-based Macs. Apple Silicon machines aren't affected.
Kulikowski further noted that GCC is often a dependency of Go in many distributions, making the likelihood of the conditions being met fairly high.
The vulnerability specifically involves deploying Manx and Sandcat agents – a set of reverse shells that are compiled dynamically and dictate how a given Caldera operation runs – with instructions set by the attacker.
[7]Ivanti endpoint manager can become endpoint ravager, thanks to quartet of critical flaws
[8]FreSSH bugs undiscovered for years threaten OpenSSH security
[9]SonicWall firewalls now under attack: Patch ASAP or risk intrusion via your SSL VPN
[10]Google patches odd Android kernel security bug amid signs of targeted exploitation
According to comments in Caldera's code, the developers behind the project were already aware the API endpoint that can be exploited by receiving a malicious request is unauthenticated, meaning if a vulnerability was ever discovered affecting it, then it likely wouldn't require valid credentials to pop it.
The bug can be exploited using a specially crafted HTTPS request, the same kind that usually passes parameters such as the communication method, encryption keys, and C2 addresses to the agents.
[11]
Kulikowski detailed the process of developing the exploit and published a slightly incomplete snippet of his proof of concept (PoC) code, omitting key steps to, in his words, "prevent script kiddies from being able to easily abuse it."
"One must investigate the Caldera source code to identify the required modifications, as copy-pasting the proof-of-concept shown here will not fully work," [12]said Kulikowski.
[13]
The advice is to either apply the patches or stop exposing the system to the internet or untrusted users, with both being recommended actions. ®
Get our [14]Tech Resources
[1] https://www.cve.org/CVERecord?id=CVE-2025-27364
[2] https://github.com/mitre/caldera
[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2Z75LjNJudNbAEDmQc2ySJgAAABI&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[4] https://www.theregister.com/2025/02/04/golang_supply_chain_attack/
[5] https://www.theregister.com/2024/11/05/python_dethrones_javascript_github/
[6] https://jhftss.github.io/Parallels-0-day/
[7] https://www.theregister.com/2025/02/21/ivanti_traversal_flaw_poc_exploit/
[8] https://www.theregister.com/2025/02/18/openssh_vulnerabilities_mitm_dos/
[9] https://www.theregister.com/2025/02/14/sonicwall_firewalls_under_attack_patch/
[10] https://www.theregister.com/2025/02/04/google_android_patch_netgear/
[11] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Z75LjNJudNbAEDmQc2ySJgAAABI&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[12] https://medium.com/@mitrecaldera/mitre-caldera-security-advisory-remote-code-execution-cve-2025-27364-5f679e2e2a0e
[13] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Z75LjNJudNbAEDmQc2ySJgAAABI&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[14] https://whitepapers.theregister.com/
Tracked as [1]CVE-2025-27364 , the max-severity vulnerability affects all versions of Caldera, including the very first ones released back in 2017, bar the latest fixed versions: 5.1.0+, or whatever's in the master source branch.
[2]Caldera began as a research project in 2015 before launching as a fully fledged adversary emulation platform. Today, the open source project is relied upon by red and blue teams to simulate attacks and breaches, and develop organizational defenses. In reality, the suite itself can be remotely hijacked.
[3]
To make matters worse, the RCE flaw can be triggered "in most default configurations," according to Dawid Kulikowski, who found and reported the hole. An attacker can only achieve RCE when [4]Go , [5]Python , and the GNU Compiler Collection (GCC) are installed on the target device, though all three dependencies are required for Caldera to be fully functional.
Speaking of vulnerabilities, researcher Mickey Jin has published two privilege-escalation exploits that can be used against Parallels Desktop for Mac to gain local root access.
CVE-2024-34331 was disclosed and "patched" by Parallels in May 2024. Since then, using various versions, Jin has found ways of bypassing the vendor's fixes. It's worth reading [6]his write-up to fully understand the confusion here and his frustration throughout the process.
It all culminated in months of poor communication from Parallels, the researcher claims, which Jin said led him to publish the exploits online last week.
Parallels told The Register it's working on hotfixes to address the issues for Intel-based Macs. Apple Silicon machines aren't affected.
Kulikowski further noted that GCC is often a dependency of Go in many distributions, making the likelihood of the conditions being met fairly high.
The vulnerability specifically involves deploying Manx and Sandcat agents – a set of reverse shells that are compiled dynamically and dictate how a given Caldera operation runs – with instructions set by the attacker.
[7]Ivanti endpoint manager can become endpoint ravager, thanks to quartet of critical flaws
[8]FreSSH bugs undiscovered for years threaten OpenSSH security
[9]SonicWall firewalls now under attack: Patch ASAP or risk intrusion via your SSL VPN
[10]Google patches odd Android kernel security bug amid signs of targeted exploitation
According to comments in Caldera's code, the developers behind the project were already aware the API endpoint that can be exploited by receiving a malicious request is unauthenticated, meaning if a vulnerability was ever discovered affecting it, then it likely wouldn't require valid credentials to pop it.
The bug can be exploited using a specially crafted HTTPS request, the same kind that usually passes parameters such as the communication method, encryption keys, and C2 addresses to the agents.
[11]
Kulikowski detailed the process of developing the exploit and published a slightly incomplete snippet of his proof of concept (PoC) code, omitting key steps to, in his words, "prevent script kiddies from being able to easily abuse it."
"One must investigate the Caldera source code to identify the required modifications, as copy-pasting the proof-of-concept shown here will not fully work," [12]said Kulikowski.
[13]
The advice is to either apply the patches or stop exposing the system to the internet or untrusted users, with both being recommended actions. ®
Get our [14]Tech Resources
[1] https://www.cve.org/CVERecord?id=CVE-2025-27364
[2] https://github.com/mitre/caldera
[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2Z75LjNJudNbAEDmQc2ySJgAAABI&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[4] https://www.theregister.com/2025/02/04/golang_supply_chain_attack/
[5] https://www.theregister.com/2024/11/05/python_dethrones_javascript_github/
[6] https://jhftss.github.io/Parallels-0-day/
[7] https://www.theregister.com/2025/02/21/ivanti_traversal_flaw_poc_exploit/
[8] https://www.theregister.com/2025/02/18/openssh_vulnerabilities_mitm_dos/
[9] https://www.theregister.com/2025/02/14/sonicwall_firewalls_under_attack_patch/
[10] https://www.theregister.com/2025/02/04/google_android_patch_netgear/
[11] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Z75LjNJudNbAEDmQc2ySJgAAABI&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[12] https://medium.com/@mitrecaldera/mitre-caldera-security-advisory-remote-code-execution-cve-2025-27364-5f679e2e2a0e
[13] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Z75LjNJudNbAEDmQc2ySJgAAABI&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[14] https://whitepapers.theregister.com/
Help me understand
While a 10 out of 10 vulnerability is never a good thing, I'm having a lot of trouble understanding why people who should know better do things like exposing anything on their network to the Internet when there is no good reason to do that.
My network has a firewall. It does not even respond to connection attempts on any incoming ports. If I decided that I really, really needed remote access to my network, I might run a wireguard server on a non-standard port, but that's as far as I'd ever open my network to the hostile environment of the Internet. I'm sure that the vast majority of technically competent people would adopt the same approach.
Yet, we repeatedly hear about companies who get compromised by exposing $deity knows what to every script kiddie and blackmail group on the planet. Then they act surprised when they get owned.
Doesn't make sense to me. Can someone explain this behaviour?