Top 10 Cybersecurity Stories This Week: FreePBX Zero-Day Under Active Exploitation, Android Critical Flaws, and SAP S/4HANA Command Injection

Sep 5, 2025 | Fresh Ink, Security

September 5, 2025 | ITBriefcase.net

Why it matters: This week showcased a dangerous convergence of actively exploited zero-day vulnerabilities across critical enterprise infrastructure. The FreePBX authentication bypass zero-day demonstrated how telecommunication systems remain prime targets for attackers seeking enterprise network footholds, while Google’s emergency Android patches addressed two privilege escalation flaws under “limited, targeted exploitation.” SAP S/4HANA’s critical command injection vulnerability highlights the ongoing threat to enterprise resource planning systems, and Docker Desktop’s container escape flaw underscores the evolving attack surface in development environments.

The bottom line: Organizations must prioritize emergency patching across telecommunication systems, mobile platforms, enterprise applications, and development tools while implementing enhanced monitoring for privilege escalation attempts and supply chain compromise targeting fundamental business infrastructure.

What’s ahead: Ten critical security developments spanning telecommunications zero-days, mobile platform exploits, enterprise application compromise, and container security failures that define cybersecurity priorities for September 2025.

1. FreePBX Zero-Day Vulnerability Exploited for Root Access on Phone Systems

Sangoma released emergency patches for a maximum severity zero-day vulnerability (CVE-2025-57819, CVSS 10.0) affecting FreePBX open-source telephony systems with internet-exposed administrator control panels. The authentication bypass flaw enables unauthenticated attackers to gain FreePBX Administrator access, perform arbitrary database manipulation, and achieve remote code execution with potential root-level privileges. Active exploitation began on or before August 21, 2025, targeting FreePBX versions 15, 16, and 17 with inadequate IP filtering or access controls.

Impact: Critical – Maximum severity telecommunications zero-day enabling complete system compromise and potential enterprise network pivoting through compromised phone systems.

Action Steps: Apply FreePBX security updates immediately (v15.0.66, v16.0.89, v17.0.3) across all installations. Remove public internet access to FreePBX administrator interfaces immediately. Implement IP-based access restrictions using FreePBX Firewall module for trusted hosts only. Investigate systems using provided indicators of compromise including modified /etc/freepbx.conf files and suspicious modular.php POST requests. Deploy enhanced monitoring for unusual extension calls to 9998 and unexpected “ampuser” database entries.

2. Google Patches Two Actively Exploited Android Vulnerabilities in September Update

Google’s September 2025 Android Security Bulletin addressed 111 vulnerabilities including two privilege escalation flaws under active exploitation: CVE-2025-48543 affecting Android Runtime and CVE-2025-38352 in the Linux kernel component. Both vulnerabilities enable local privilege escalation without user interaction or additional execution privileges, with Google confirming “limited, targeted exploitation” in real-world attacks. The update also includes fixes for 23 Pixel-specific vulnerabilities and updates for Wear OS and Automotive platforms.

Impact: High – Actively exploited mobile platform vulnerabilities enabling privilege escalation in targeted attacks, likely for surveillance or mercenary spyware deployment.

Action Steps: Update Android devices to security patch level 2025-09-05 immediately across all organizational mobile assets. Enable automatic security updates on Android devices to ensure rapid deployment of future patches. Implement mobile device management solutions monitoring for suspicious privilege escalation attempts. Review mobile application permissions and access controls for potential abuse scenarios. Establish incident response procedures for compromised mobile devices containing corporate data.

3. SAP S/4HANA Critical Command Injection Flaw Exploited in Wild Attacks

SecurityBridge researchers confirmed active exploitation of a critical SAP S/4HANA vulnerability (CVE-2025-42957, CVSS 9.9) enabling complete system takeover through ABAP code injection. The flaw affects function modules exposed via RFC, allowing low-privileged authenticated users to inject arbitrary code, bypass authorization checks, and achieve full system compromise including database manipulation, superuser account creation, and password hash extraction. SAP released patches in August 2025, but unpatched systems face immediate risk of fraud, data theft, and ransomware deployment.

Impact: Critical – Enterprise resource planning system vulnerability enabling complete business system compromise through minimal authentication requirements.

Action Steps: Apply SAP Security Notes 3627998 and 3633838 immediately across all S/4HANA installations. Review and restrict S_DMIS authorization object usage with activity 02 permissions. Implement SAP UCON to restrict RFC usage and enhance access controls. Deploy enhanced monitoring for anomalous RFC calls and unauthorized administrative account creation. Establish network segmentation isolating SAP systems from general enterprise networks and implement regular backup procedures for rapid recovery.

4. Docker Desktop Container Escape Vulnerability Enables Host Takeover

Docker patched a critical container escape vulnerability (CVE-2025-9074, CVSS 9.3) in Desktop versions 4.44.3 affecting Windows and macOS platforms. The flaw allows malicious containers to access the Docker Engine API at 192.168.65.7:2375 without authentication, enabling container creation, volume mounting, and host system access. On Windows with WSL2 backend, attackers can mount the entire filesystem with administrator privileges and overwrite system DLLs for privilege escalation. Enhanced Container Isolation (ECI) does not mitigate this vulnerability.

Impact: High – Critical development platform vulnerability enabling container escape and complete host system compromise through unauthenticated API access.

Action Steps: Upgrade Docker Desktop to version 4.44.3 or later immediately across all development environments. Review container workloads for potential compromise indicators and suspicious API access patterns. Implement zero-trust principles for local development environments treating internal APIs as potential attack vectors. Deploy enhanced monitoring for Docker Engine API abuse and container manipulation attempts. Establish procedures for validating container image integrity and implementing secure container development practices.

5. CISA Adds WhatsApp and TP-Link Vulnerabilities to Known Exploited Catalog

CISA added two actively exploited vulnerabilities to its KEV catalog: CVE-2025-55177 affecting Meta WhatsApp and CVE-2020-24363 in TP-Link TL-WA855RE wireless extenders. The WhatsApp vulnerability enables unauthorized URL content processing on target devices through incorrect authorization of linked device synchronization messages. The TP-Link flaw allows unauthenticated factory reset and device hijacking through missing authentication for critical functions. Federal agencies must remediate by September 23, 2025.

Impact: Medium – Actively exploited communication platform and network infrastructure vulnerabilities enabling unauthorized access and device manipulation.

Action Steps: Apply WhatsApp security updates immediately across all organizational mobile devices and review linked device configurations. Retire discontinued TP-Link TL-WA855RE wireless extenders and replace with supported devices featuring proper authentication controls. Implement network access control solutions monitoring for unauthorized device reset attempts. Deploy enhanced monitoring for suspicious messaging platform activity and URL processing abuse. Establish procedures for rapid communication platform security update deployment.

6. Chrome 140 Addresses High-Severity V8 JavaScript Engine Vulnerability

Google released Chrome 140 patching six vulnerabilities including a high-severity use-after-free flaw (CVE-2025-9864) in the V8 JavaScript engine that could enable remote code execution. The vulnerability was discovered by Pavel Kuzmin of Yandex Security Team and affects core browser rendering capabilities. Additional medium-severity flaws were addressed in Toolbar, Extensions, and Downloads components with bug bounty rewards ranging from $1,000 to $5,000.

Impact: Medium – High-severity browser engine vulnerability enabling potential remote code execution through malicious web content processing.

Action Steps: Update Google Chrome to version 140 immediately across all organizational systems and deploy automatic browser update policies. Implement browser security controls including sandbox enforcement and extension management policies. Deploy web filtering solutions blocking suspicious JavaScript execution attempts. Review web application security policies for potential browser-based attack vectors. Establish procedures for rapid browser security update deployment across enterprise environments.

7. Multiple Industrial Control Systems Vulnerabilities Disclosed by CISA

CISA released five industrial control systems advisories affecting Honeywell Experion PKS, Mitsubishi/ICONICS Genesis64, Delta Electronics COMMGR, and transport sector protocols. Honeywell’s platform contains multiple memory corruption vulnerabilities (CVE-2025-2520, CVE-2025-2521, CVE-2025-2523) with high CVSS scores requiring hotfix deployment. The Delta Electronics flaw enables command injection and authentication bypass in industrial communication management systems.

Impact: Medium – Critical infrastructure vulnerabilities affecting industrial control systems and requiring coordinated IT/OT security responses.

Action Steps: Apply vendor-specific hotfix updates for Honeywell PKS R520.2 TCU9 HF1 and R530 TCU3 HF1 immediately. Implement network segmentation isolating industrial control systems from enterprise networks. Deploy enhanced monitoring for industrial control system abuse and unauthorized access attempts. Review ICS/SCADA security policies and incident response procedures for operational technology environments. Establish procedures for coordinating security updates with safety-critical operational requirements.

8. Chrome AI Agent Big Sleep Discovers Critical ANGLE Vulnerability

Google’s AI-powered vulnerability discovery agent Big Sleep identified a critical use-after-free vulnerability (CVE-2025-9478) in Chrome’s ANGLE graphics engine before human researchers could find it. The flaw affects WebGL rendering and graphics processing capabilities, with successful exploitation potentially enabling remote code execution through malicious web content. This represents the first known instance of AI-discovered vulnerabilities being patched proactively to prevent real-world exploitation.

Impact: Medium – AI-discovered graphics engine vulnerability demonstrating evolving vulnerability research capabilities and proactive security measures.

Action Steps: Update Google Chrome to the latest version containing ANGLE security fixes immediately. Implement web application security controls monitoring for graphics-based exploitation attempts. Deploy browser isolation solutions for high-risk web browsing activities. Review AI-assisted security research capabilities for organizational vulnerability discovery programs. Establish procedures for integrating automated vulnerability discovery into security operations.

9. Passwordstate Enterprise Password Manager Authentication Bypass Warning

Click Studios warned customers about a high-severity authentication bypass vulnerability affecting Passwordstate enterprise password manager requiring immediate patching. The flaw could enable unauthorized access to stored credentials and password databases, potentially compromising organizational authentication systems. Details remain limited pending widespread patch deployment across customer environments.

Impact: Medium – Enterprise password management system vulnerability threatening organizational credential security and authentication infrastructure.

Action Steps: Apply Passwordstate security updates immediately across all password management infrastructure. Review password manager access logs for suspicious authentication attempts and unauthorized access patterns. Implement enhanced monitoring for password database manipulation and credential extraction attempts. Deploy backup authentication systems and credential recovery procedures for emergency scenarios. Establish procedures for rapid password manager security update deployment and credential rotation.

10. Enhanced Container Isolation Vulnerabilities and Kubernetes Security Updates

Multiple container platform vulnerabilities emerged this week including NVIDIA Container Toolkit issues (CVE-2025-23266) affecting Docker Desktop versions prior to 4.44 with manually enabled CDI mode. Enhanced Container Isolation features demonstrated limitations against sophisticated container escape attempts, highlighting the need for defense-in-depth container security strategies beyond basic isolation mechanisms.

Impact: Low – Container platform security feature limitations requiring enhanced monitoring and defense-in-depth strategies for container environments.

Action Steps: Update Docker Desktop to version 4.44 or later to address NVIDIA Container Toolkit vulnerabilities. Review Enhanced Container Isolation configurations and implement additional security controls for high-risk workloads. Deploy container runtime security monitoring solutions detecting escape attempts and privilege escalation. Implement Kubernetes security policies restricting container capabilities and resource access. Establish procedures for container image scanning and supply chain security validation.


Key Takeaways for IT Leaders

This week’s developments highlight several critical trends:

  • Telecommunications infrastructure targeting continues with FreePBX zero-day exploitation demonstrating how phone systems provide attractive attack vectors for enterprise network compromise
  • Mobile platform exploitation escalates with Android vulnerabilities under active targeting, likely for surveillance and spyware deployment against high-value individuals and organizations
  • Enterprise application compromise accelerates through SAP S/4HANA exploitation enabling complete business system takeover through minimal authentication requirements
  • Development environment attacks expand via Docker Desktop vulnerabilities showing how container platforms create new attack surfaces requiring specialized security controls

Organizations must prioritize emergency patching across telecommunications, mobile, enterprise application, and development platforms while implementing enhanced monitoring for privilege escalation attempts, authentication bypass, and container escape scenarios targeting critical business infrastructure.Stay informed on the latest cybersecurity developments by following ITBriefcase.net for daily updates and in-depth analysis.