Piotr Kijewski
piotrkijewski.bsky.social
Piotr Kijewski
@piotrkijewski.bsky.social
@shadowserver.bsky.social‬
Reposted by Piotr Kijewski
React Server Components (CVE-2025-55182) RCE findings so far on 2025-12-05. 77664 IPs found vulnerable (based on Assetnote methodology).

IP data is being shared in Vulnerable HTTP reports: www.shadowserver.org/what-we-do/n...

Dashboard geo breakdown: dashboard.shadowserver.org/statistics/c...
December 6, 2025 at 10:13 AM
Reposted by Piotr Kijewski
Excited that our collaboration with
VulnCheck (vulncheck.com) continues to grow as we welcome them as a new Shadowserver Alliance Partner -Silver tier!

We look forward to enhancing our joint efforts to help network defenders globally with vulnerability management.
VulnCheck - Outpace Adversaries
Vulnerability intelligence that predicts avenues of attack with speed and accuracy.
vulncheck.com
December 1, 2025 at 3:20 PM
Reposted by Piotr Kijewski
Operation Endgame Season 3 Episode 2: Interlude released in time for Thanksgiving, recapping some of the #cybercrime disruption successes achieved so far, by partners working together internationally. Happy holidays - looking forward to future episodes!
November 27, 2025 at 11:35 AM
Reposted by Piotr Kijewski
We shared out 10,449 entries (e-mails) affected by the JSONFormatter and CodeBeautifier leak discovered by @watchTowr (see labs.watchtowr.com/stop-putting...).

Data shared in a our Compromised Account Report www.shadowserver.org/what-we-do/n... (search for 2025-11-26 & compromised_account prefix)
November 27, 2025 at 4:38 PM
Reposted by Piotr Kijewski
We have been sharing Monsta FTP CVE-2025-34299 (pre-auth RCE) vulnerable instances for the last few weeks. We still see over 780 IPs vulnerable (version based check) instances daily. Most affected: US & Slovakia: dashboard.shadowserver.org/statistics/c...

dashboard.shadowserver.org/statistics/c...
November 24, 2025 at 1:27 PM
Reposted by Piotr Kijewski
Proud to once again support our LE partners in Operation Endgame Season 3

86M stolen data items from 525K victim IPs across 226 countries included in our new Rhadamanthys Historic Bot Victims Special Report, run overnight 2025-11-12

More details:
shadowserver.org/news/rhadama...
November 13, 2025 at 10:13 AM
Reposted by Piotr Kijewski
"Don’t take BADCANDY from strangers ..."

The Australian Signals Directorate (ASD) recently published an advisory on the BadCandy implant still present in many Cisco IOS XE devices: www.cyber.gov.au/about-us/vie...

We still see around 15 000 Cisco IOS XE devices with the implant
November 3, 2025 at 8:30 PM
Reposted by Piotr Kijewski
We added CVE-2025-40778 BIND9 tagging (potential susceptibility to cache poisoning) to our DNS scans: www.shadowserver.org/what-we-do/n...

We found nearly 8898 unpatched DNS open resolvers on 2025-10-30, down to 6653 on 2025-11-01: dashboard.shadowserver.org/statistics/c...
November 2, 2025 at 2:02 PM
Reposted by Piotr Kijewski
Attention - Microsoft WSUS CVE-2025-59287 incidents! We are observing exploitation attempts based on a published POC. We have also began fingerprinting exposed WSUS instances (ports 8530/8531) with at least 2800 seen on 2025-10-25 (not necessarily vulnerable).
October 26, 2025 at 6:39 PM
Reposted by Piotr Kijewski
We are now sharing daily IP data on WatchGuard Fireware OS IKEv2 Out-of-Bounds Write CVE-2025-9242 vulnerable instances, with over 71 000 seen on 2025-10-18. Data shared in our Vulnerable ISAKMP reportings - www.shadowserver.org/what-we-do/n...

Top affected: US with 23.2K instances
October 19, 2025 at 1:30 PM
Reposted by Piotr Kijewski
Proud to support our Law Enforcement partners in another successful cybercrime disruption:
Operation SIMCARTEL

Great work everyone involved 👏

europol.europa.eu/media-press/...
October 18, 2025 at 1:37 PM
Reposted by Piotr Kijewski
Regarding F5 network compromise (see my.f5.com/manage/s/art...):

We are sharing daily IP data on F5 exposures in our Device ID www.shadowserver.org/what-we-do/n... (device_vendor set to F5).

~269K IPs seen daily, nearly half in US.

Geo breakdown: dashboard.shadowserver.org/statistics/i...
October 16, 2025 at 7:42 PM
Reposted by Piotr Kijewski
Oracle E-Business Suite incidents: We have added CVE-2025-61882 scanning & reporting with 576 potential vulnerable IPs found on 2025-10-06. Top affected: USA

IP data in www.shadowserver.org/what-we-do/n...

World map view of likely vulnerable instances: dashboard.shadowserver.org/statistics/c...
October 7, 2025 at 2:04 PM
Reposted by Piotr Kijewski
You can track CVE-2025-20333 & CVE-2025-20362 vulnerable (unpatched) Cisco ASA/FTD instances here - dashboard.shadowserver.org/statistics/c...

Around ~45K vulnerable seen on 2025-10-04
October 5, 2025 at 10:00 AM
Reposted by Piotr Kijewski
Last week we released a new daily report type, "Badsecrets Report": www.shadowserver.org/what-we-do/n... (default severity: HIGH)

It identifies the use of known or very weak cryptographic secrets across a variety of web frameworks/platforms. 12168 IPs seen (2025-09-14) using "bad" secrets!
September 15, 2025 at 8:29 AM
Reposted by Piotr Kijewski
FreePBX CVE-2025-57819 (CVSS 10.0) incidents: 6620 unpatched instances seen 2025-08-29, at least 386 compromised.

Dashboard links:
Vulnerable (unpatched): dashboard.shadowserver.org/statistics/c...

Compromised:
dashboard.shadowserver.org/statistics/c...
August 30, 2025 at 3:24 PM
Running unpatched Citrix NetScalers or seeing them in your constituency? Now is the time to get those checked for compromise and patched ...
ALERT: On 2025-08-26 over 28K Citrix NetScaler instances were unpatched to CVE-2025-7775 RCE. There is exploitation in the wild confirmed by US CISA KEV.

Patch info: support.citrix.com/support-home...

Top affected: US, Germany

Dashboard geo breakdown: dashboard.shadowserver.org/statistics/c...
August 27, 2025 at 11:44 AM
Reposted by Piotr Kijewski
We added a new daily scan report type, Accessible GPRS Tunneling Protocol (GTP) services listing IPs with publicly exposed GTP-C (Core) on port 2123/UDP & GTP-U (User) 2152/UDP.

Report format: www.shadowserver.org/what-we-do/n...

Dashboard World map: dashboard.shadowserver.org/statistics/c...
August 20, 2025 at 6:01 PM
Reposted by Piotr Kijewski
Since July 30th we are seeing an increase in scans coming from ~2200 compromised Cisco Small Business RV series routers, Linksys LRT series & Araknis Networks (AN-300-RT-4L2W). Top affected: US but also many others.

IP data on these scans shared in www.shadowserver.org/what-we-do/n...
August 19, 2025 at 10:15 AM
Reposted by Piotr Kijewski
We added version based N-able N-central RMM CVE-2025-8875 & CVE-2025-8876 detection to our daily scans. 1077 IPs unpatched IPs seen on 2025-08-15. Both CVEs recently added to US CISA KEV.

Top affected: US, Canada, Netherlands, UK

Dashboard map view: dashboard.shadowserver.org/statistics/c...
August 17, 2025 at 3:30 PM
Reposted by Piotr Kijewski
We added VMware ESXi CVE-2025-41236 (CVSS 9.3) version based detection to our daily scans. First added 2025-07-19 with 17,238 IPs found. Latest scan (2025-08-10) detects 16,330 unpatched IPs, which is a slow patch rate.

Top affected: France, China, US, Germany
August 11, 2025 at 12:49 PM
Reposted by Piotr Kijewski
We added Microsoft Exchange CVE-2025-53786 detection to our daily scans (version based). See US CISA Emergency Directive 25-02: www.cisa.gov/news-events/...

Over 28K IPs unpatched (2025-08-07). Top affected: US, Germany, Russia

Dashboard world map: dashboard.shadowserver.org/statistics/c...
August 8, 2025 at 2:21 PM
Reposted by Piotr Kijewski
We added version based SonicWall SMA100 CVE-2025-40596 detection to our daily scans - at least 3200 IPs seen still unpatched!

Top affected: US, Japan, Germany

Dashboard map: dashboard.shadowserver.org/statistics/c...

NVD entry: nvd.nist.gov/vuln/detail/...
August 7, 2025 at 11:16 PM
Reposted by Piotr Kijewski
PaperCut CVE-2023-2533 was recently added to the
CISA KEV catalog. We added version based detection of unpatched IPs with 129 seen (2025-08-03).

dashboard.shadowserver.org/statistics/c...

We also scan for CVE-2023-39143 & CVE-2023-27350. Data in Vulnerable HTTP: shadowserver.org/what-we-do/n...
August 4, 2025 at 10:43 AM
Reposted by Piotr Kijewski
We’re excited to welcome SURFcert to the Shadowserver Alliance as a Bronze Tier Partner!

Together with SURFcert and fellow Alliance Partners, we’re making the Internet more secure for all.

Read more about SURFcert:
www.surf.nl/en
August 1, 2025 at 9:05 AM