VulnerabilitiesHIGH

New Metasploit Modules Unleash Powerful Exploits

#CVE-2024-37032#CVE-2026-2329#CVE-2026-1731#Metasploit#VoIP

Original Reporting

R7Rapid7 Blog·Jacquie Harris

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk — action recommended within 24-48 hours

🛡️
🛡️ VULNERABILITY DETAILS
CVE ID
CVSS Score
Severity Rating
Affected Product
Vendor
Vulnerability Type
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Actively Exploited
Patch Available
Workaround Available
🎯

Basically, Metasploit added new tools that hackers can use to break into systems.

Quick Summary

Metasploit's latest update introduces powerful new exploit modules targeting critical vulnerabilities. Users of affected systems, especially VoIP devices, should be on high alert. These exploits can lead to unauthorized access and data theft. Stay updated and secure your systems now!

What Happened

Metasploit has just released a significant update that introduces several new exploit modules, enhancing its capabilities for security testing. Among the most notable additions are two critical vulnerabilities: the Ollama path traversal RCE (CVE-2024-37032) and the Grandstream GXP1600 stack overflow (CVE-2026-2329). These exploits allow attackers to gain unauthorized access and control over systems, making them particularly dangerous.

The Ollama exploit enables attackers to execute arbitrary code by manipulating file paths, while the Grandstream exploit targets VoIP devices, allowing for credential harvesting and SIP interception. Additionally, the BeyondTrust PRA/RS module has been upgraded to support a new command injection vulnerability (CVE-2026-1731). This upgrade also improves existing modules, making them more effective and reliable.

Why Should You Care

If you use any of the affected systems, this update could directly impact your security. Imagine leaving your front door unlocked; it makes it easy for anyone to walk in uninvited. Similarly, these vulnerabilities can allow hackers to access sensitive information, steal credentials, or even take control of your devices. Your personal data and privacy are at risk.

Moreover, businesses relying on VoIP technology or using the affected software must be vigilant. A successful attack could lead to significant financial losses or reputational damage. By understanding these vulnerabilities, you can better protect yourself and your organization from potential threats.

What's Being Done

The Metasploit team is actively working on addressing these vulnerabilities by releasing new modules and updates. Here’s what you should do if you’re affected:

  • Update your Metasploit installation to access the latest modules and improvements.
  • Monitor your systems for any unusual activity, especially if you use the affected software.
  • Educate your team about these vulnerabilities to ensure everyone is aware and vigilant.

Experts are closely watching how these vulnerabilities are being exploited in the wild and are prepared to respond to any emerging threats. Keeping your systems updated and secure is more important than ever.

Pro Insight

🔒 Pro insight: The introduction of these modules indicates an increasing trend in exploit chaining, emphasizing the need for layered defenses.

🗓️ Story Timeline

Story broke by Rapid7 Blog
Covered by Rapid7 Blog
Covered by Rapid7 Blog
Covered by Rapid7 Blog

Sources

Original Report

R7Rapid7 Blog· Jacquie Harris
Read Original

Related Pings

MEDIUMVulnerabilities

OpenSSL Vulnerabilities - Sensitive Data Exposed in RSA KEM

OpenSSL's April 2026 update addresses critical vulnerabilities, particularly CVE-2026-31790. This flaw can leak sensitive data through improper RSA KEM handling. Users are urged to patch immediately to protect their systems.

Cyber Security News·
MEDIUMVulnerabilities

OpenSSL 3.6.2 - Eight CVEs Fixed in Latest Release

OpenSSL has released version 3.6.2, fixing eight CVEs, including critical vulnerabilities. Users of versions 3.6 and 3.5 should update immediately to ensure security.

Help Net Security·
CRITICALVulnerabilities

Ninja Forms - Critical Flaw Allows Remote Code Execution

A critical flaw in the Ninja Forms plugin for WordPress allows attackers to upload harmful files. With over 600,000 downloads, users must update immediately to avoid exploitation.

BleepingComputer·
CRITICALVulnerabilities

VMware Security Advisory - Critical Vulnerabilities Identified

VMware has issued a critical security advisory for its Tanzu products, urging immediate updates. Affected versions prior to MySQL for Kubernetes 2.0.2 must be patched. Don't risk security vulnerabilities!

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Erlang Security Advisory - Critical Vulnerabilities Addressed

Erlang's latest security advisory reveals critical vulnerabilities in its software. Users must update to secure versions to protect their systems from potential exploits. Don't delay in applying these necessary fixes!

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Microsoft Edge - Critical Security Advisory Released

Microsoft has released a critical security advisory for Edge due to a vulnerability that could be exploited. Users are urged to update immediately. Mozilla has also issued advisories for Firefox vulnerabilities.

Canadian Cyber Centre Alerts·