Search
UP-TO-DATE

Blog

Our employees frequently engage in research projects to live up to the high standard. They analyze the latest topics, methods and tools in interesting information security areas and prepare them in this context. The results of these activities contribute, for example, to projects, lectures at conferences, market overviews and articles for technical journals as well in advisories and zero-day vulnerabilities.

Blog Articles

Command-and-Control

Beacon Object Files for Mythic – Part 1

November 19, 2025 – This is the first post in a series of blog posts on how we implemented support for Beacon Object Files into our own command and control (C2) beacon using the Mythic framework. In this first post, we will take a look at what Beacon Object Files are, how they work and why they are valuable to us.

Author: Leon Schmidt

Read more »
Forensic

IOCs of the npm crypto stealer supply chain incident

September 25, 2025 – Regarding the Node Package Manager (npm) supply chain attack that started September 8, 2025, and affected 27 packages, we have collected and identified corresponding hashes to make them publicly available in one single place for easier access.

Author: Niklas Vömel

Read more »
Red Teaming

The Key to COMpromise – Part 4

February 26, 2025 – In this final part of our series on COM hijacking, we will examine a custom-named pipe IPC protocol implemented by Bitdefender Total Security and detail our approach to reverse engineering it. We will explore how we could use COM hijacking and this custom communication to gain SYSTEM privileges (CVE-2023-6154). Additionally, we will examine how to mitigate the vulnerabilities discussed throughout this series of blog posts. Lastly, we will demonstrate how COM hijacking can be exploited to perform a Denial-of-Service (DoS) attack on security products.

Author: Alain Rödel and Kolja Grassmann

Read more »

Research

Advisories

Vulnerability in Trend Micro Apex One (CVE-2024-55631)

January 8, 2025 – Our colleagues Frederik Reiter and Jan-Luca Gruber found a vulnerability in the Damage Cleanup Engine of Trend Micro Apex One, which allows and attacker to delete a folder with high privileges. This can be leveraged to escalate privileges in the context of SYSTEM.

Read more »

Vulnerabilities

cirosec conducts vulnerability research into products and services, which at times results in zero-day vulnerabilities being discovered.

cirosec follows a responsible disclosure policy when dealing with zero-day vulnerabilities found during research or customer projects. The goal is to balance the need of giving the vendor or open-source project enough time to develop and distribute a fix for the vulnerability with the need of the public to know about the security vulnerability. The policy is in accordance with industry-standard responsible disclosure practices. Our responsible disclosure policy can be found here.

Below is a list of CVEs vulnerabilities identified or assigned by cirosec and presented here for reference and cataloguing.

VulnerabilityCVECVSS ScorePublication DateMore Details
Vulnerability in Two App Studio JourneyCVE-2025-414597.8 (CVSS v3.1)July 21, 2025Advisory
Vulnerability in Two App Studio JourneyCVE-2025-414585.5 (CVSS v3.1)July 21, 2025Advisory
Vulnerability in SYNCPILOT LIVE CONTRACTCVE-2025-23065.9 (CVSS v3.1)May 15, 2025Advisory
Vulnerability in SYNCPILOT LIVE CONTRACTCVE-2025-23058.6 (CVSS v3.1)May 15, 2025Advisory
Vulnerability in Elaborate Bytes Virtual Clone Drive [ext]CVE-2025-18657.8 (CVSS v3.1)April 4, 2025Changelog
Vulnerability in Mobatek MobaXtermCVE-2025-07146.5 (CVSS v3.1)February 17, 2025Advisory
Vulnerability in Intel AMTCVE-2024-383077.7 (CVSS v3.1)February 11, 2025Intel
Vulnerability in G DATA Management Server [ext]CVE-2025-05427.8 (CVSS v3.1)January 24, 2025Advisory
Vulnerability in G DATA Security Client [ext]CVE-2025-05437.8 (CVSS v3.1)January 24, 2025Advisory
Vulnerability in Trend Micro Apex OneCVE-2024-556317.8 (CVSS v3.1)January 8, 2025Advisory, Trend Micro
Vulnerability in HP Hotkey SupportCVE-2024-274588.8 (CVSS v3.1)October 4, 2024Advisory, HP
Vulnerability in AVG Internet SecurityCVE-2024-65107.8 (CVSS v3.1)September 12, 2024Advisory
Vulnerability in OverwolfCVE-2024-78347.8 (CVSS v3.1)September 4, 2024Advisory
Vulnerability in baramundi Management AgentCVE-2024-66897.8 (CVSS v3.1)July 15, 2024Advisory, baramundi
Vulnerability in Trend Micro Apex OneCVE-2024-363027.8 (CVSS v3.1)July 1, 2024ZDI-Advisory, Trend Micro
Vulnerability in Checkpoint HarmonyCVE-2024-249127.8 (CVSS v3.1)May 1, 2024Advisory, Checkpoint
Vulnerability in Webroot AntivirusCVE-2023-72417.8 (CVSS v3.1)May 1, 2024Advisory, Webroot
Vulnerability in BitdefenderCVE-2023-61547.8 (CVSS v3.1)April 1, 2024Advisory, Bitdefender
Vulnerability in neo42 Sumatra PDF Package 7.8 (CVSS v3.1)November 7, 2023Advisory
Vulnerability in Bytello Share 7.8 (CVSS v3.1)November 6, 2023Advisory
Vulnerability in Kiteworks OwnCloudCVE-2023-72736.8 (CVSS v3.1)November 4, 2023Advisory
Vulnerability in VMware WorkstationCVE-2023-208547.8 (CVSS v3.1)February 3, 2023Advisory, VMware
Vulnerability in Remote Access Software from RealVNCCVE-2022-419757.8 (CVSS v3.1)September 30, 2022AdvisoryRealVNC

Blogs - Overview

TitleAuthorPublication DateCategory
Beacon Object Files for Mythic – Part 1Leon SchmidtNovember 19, 2025Red Teaming, Command-And-Control
Windows Instrumentation Callbacks – HooksLino FaccoNovember 12, 2025Red Teaming, Reverse Engineering, Windows
Windows Instrumen­tation CallbacksLino FaccoNovember 5, 2025Red Teaming, Reverse Engineering, Windows
IOCs of the npm crypto stealer supply chain incidentNiklas VömelSeptember 25, 2025Forensic, Incident Handling
Effektive Governance-Strategien im Red TeamingHannes AllmannJune 30, 2025Red Teaming
The Key to COMpromise – Part 3Alain Rödel and Kolja GrassmannFebruary 12, 2025Red Teaming
The Key to COMpromise – Part 2Alain Rödel and Kolja GrassmannJanuary 15, 2025Red Teaming
TLPT: Bedrohungsorientierte Penetrationstests nach DORAMichael BrüggeJanuary 24, 2025Red Teaming
The Key to COMpromise Part 1Alain Rödel and Kolja GrassmannJanuary 15, 2025Red Teaming
Wer hat das Elster-Zertifikat weitergegeben?Benjamin HäubleinDecember 3, 2024Identity
Google DoC2Frederik ReiterNovember 7, 2024Command-and-Control, Red Teaming
Abusing Microsoft Warbird for Shellcode ExecutionJan-Luca Gruber & Frederik ReiterNovember 7, 2024Red Teaming, Reverse Engineering, Windows
Inside the NAC PiLeon SchmidtJuly 5, 2024Red Teaming
Loader Dev. 5 – Loading our payloadKolja GrassmannMay 10, 2024Red Teaming
Loader Dev. 4 – AMSI and ETWKolja GrassmannApril 30, 2024Red Teaming
Loader Dev. 3 – Evading userspace hooksKolja GrassmannApril 10, 2024Red Teaming
Loader Dev. 2 – Dynamically resolving functionsKolja GrassmannMarch 10, 2024Red Teaming
Loader Dev. 1 – BasicsKolja GrassmannFebruary 10, 2024Red Teaming
Microsoft Tiering Model – Part 3/3Hagen MolzerJanuary 10, 2024AD Security
Microsoft Tiering Model – Part 2/3Hagen MolzerDecember 10, 2023AD Security
Microsoft Tiering Model – Part 1/3Hagen MolzerNovember 10, 2023AD Security

Your contact person

Do you want to protect your systems? Feel free to get in touch with us.
Search
Search