WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships (TLP CLEAR) Weekly Vulnerabilities to Prioritize – August 28, 2025
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

(TLP CLEAR) Weekly Vulnerabilities to Prioritize – August 28, 2025

TLP:CLEAR

Author: Chase Snow

Created: Thursday, August 28, 2025 - 12:50

Categories: Cybersecurity

The below vulnerabilities have been identified by WaterISAC analysts as important for water and wastewater utilities to prioritize in their vulnerability management efforts. WaterISAC shares critical vulnerabilities that affect widely used products and may be under active exploitation. WaterISAC draws additional awareness in alerts and advisories when vulnerabilities are confirmed to be impacting, or have a high likelihood of impacting, water and wastewater utilities. Members are encouraged to regularly review these vulnerabilities, many of which are often included in CISA’s Known Exploited Vulnerabilities (KEV) Catalog.

Citrix NetScaler Memory Overflow Vulnerability
CVSS Score: 9.2
CVE: CVE-2025-7775
Description: Memory overflow vulnerability leading to Remote Code Execution and/or Denial of Service in NetScaler ADC and NetScaler Gateway. This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise. CISA has added this vulnerability to its KEV catalog.
Source: https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694938
Additional Reading:

  • Citrix NetScaler customers hit by third actively exploited zero-day vulnerability since June

Citrix Session Recording Deserialization of Untrusted Data Vulnerability
CVSS Score: 5.1
CVE: CVE-2024-8069
Description: Limited remote code execution with privilege of a NetworkService Account access in Citrix Session Recording if the attacker is an authenticated user on the same intranet as the session recording server. CISA has added this vulnerability to its KEV catalog.
Source: https://support.citrix.com/external/article?articleUrl=CTX691941-citrix-session-recording-security-bulletin-for-cve20248068-and-cve20248069&language=en_US

Citrix Session Recording Improper Privilege Management Vulnerability
CVSS Score: 5.1
CVE: CVE-2024-8068
Description: Privilege escalation to NetworkService Account access in Citrix Session Recording when an attacker is an authenticated user in the same Windows Active Directory domain as the session recording server domain. CISA has added this vulnerability to its KEV catalog.
Source: https://support.citrix.com/external/article?articleUrl=CTX691941-citrix-session-recording-security-bulletin-for-cve20248068-and-cve20248069&language=en_US

Git Link Following Vulnerability
CVSS Score: 8.1
CVE: CVE-2025-48384
Description: Arbitrary code execution through broken config quoting. Upgrade to the latest Git version, or avoid recursively cloning submodules in untrusted repositories. CISA has added this vulnerability to its KEV catalog.
Source: https://github.com/git/git/security/advisories/GHSA-vwqx-4fm8-6qc9

Apple iOS, iPadOS, and macOS Out-of-Bounds Write Vulnerability
CVSS: N/A
CVE: CVE-2025-43300
Description: An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Sonoma 14.7.8, macOS Ventura 13.7.8, iPadOS 17.7.10, macOS Sequoia 15.6.1, iOS 18.6.2 and iPadOS 18.6.2. Processing a malicious image file may result in memory corruption. CISA has added this vulnerability to its KEV catalog.Source:https://github.com/b1n4r1b01/n-days/blob/main/CVE-2025-43300.md

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar