Stephen Fewer Profile
Stephen Fewer

@stephenfewer

Followers
8K
Following
849
Statuses
766

Principal Security Researcher @rapid7. Decompiler @relyze. Core @metasploit dev 2009 - 2013. MSRC Top 100 2015. Pwn2Own 2011, 2021, 2024.

Ireland
Joined March 2009
Don't wanna be here? Send us removal request.
@stephenfewer
Stephen Fewer
13 days
@infosec_au @mgianarakis Congratulations! 🎉
0
0
1
@stephenfewer
Stephen Fewer
14 days
Great analysis from @the_emmons on the recent SonicWall VPN auth bypass. Hijacking an active client SSL VPN connection is wild. Check out the analysis of CVE-2024-53704 here...
@the_emmons
Ryan Emmons
14 days
The Rapid7 ETR team just published an analysis of CVE-2024-53704, a SonicWall VPN authentication bypass that was announced earlier this month. Check it out!
1
7
23
@stephenfewer
Stephen Fewer
15 days
@SinSinology Wow, a fantastic achievement, congratulations! 🎉👏
1
0
6
@stephenfewer
Stephen Fewer
18 days
RT @steventseeley: Very impressive work from @SinSinology, it just goes to show what determination and skill combined can achieve 😎
0
3
0
@stephenfewer
Stephen Fewer
20 days
I observed that new checks were added to the code path for the rsh technique, which prevented an unregistered fortigate device being able to trigger the issue. I did not test if a registered device could still leverage the feature, but perhaps this is possible, AFAIK the rsh feature itself was not removed.
1
0
2
@stephenfewer
Stephen Fewer
25 days
@MCKSysAr @0cdefender0 @watchtowrcyber Thanks! Will Dormann mentioned something similar (. I didn't come across this against my VM of 22.7r2.4. I wonder what the difference is in setups/versions or maybe my ruby install 🤔
1
0
2
@stephenfewer
Stephen Fewer
26 days
@fullspectrumdev @WatchTowr Yup that would work. Unfortunately the target web server process doesn't fork on a new client connection, so you have to make your attempts in serial, but as you say, that doesn't affect targeting many targets in parallel.
0
0
0
@stephenfewer
Stephen Fewer
26 days
PoC for CVE-2025-0282 targeting 22.7r2.4 can be found here:
0
5
20
@stephenfewer
Stephen Fewer
1 month
@SinSinology That's awesome - great technique, congrats🔥
1
0
2
@stephenfewer
Stephen Fewer
1 month
We now have a @metasploit RCE exploit module in the pull queue for CVE-2024-55956 - an unauthenticated file write vulnerability affecting Cleo LexiCom, VLTrader, and Harmony which was exploited in the wild last month as 0day:
Tweet media one
4
61
205
@stephenfewer
Stephen Fewer
1 month
Fantastic opportunity to join the @rapid7 vuln research team in a manager role🚀
@catc0n
Caitlin Condon
1 month
Rapid7's vulnerability research team is hiring a manager in Dublin, IE to run external CVD, shepherd new 0day research, and lead a small team of exceptionally skilled folks who are uncovering new forms of risk:
0
1
5
@stephenfewer
Stephen Fewer
1 month
@chudyPB Congrats Piotr!
0
0
4
@stephenfewer
Stephen Fewer
1 month
RT @metasploit: Our annual wrap-up is here with all of the hotness from 2024! The deepest of thanks to our 62 contributors from last year,…
0
14
0
@stephenfewer
Stephen Fewer
1 month
RT @alexjplaskett: RCE via the Fax Machine by @rdjgr and Carlo Meijer
0
31
0
@stephenfewer
Stephen Fewer
2 months
RT @starlabs_sg: 🎄 All I Want for Christmas is a CVE-2024-30085 Exploit 🎄 As always, we at @starlabs_sg are sharing what we learnt. This ti…
0
48
0
@stephenfewer
Stephen Fewer
2 months
RT @catc0n: Rapid7 analysis of Apache #Struts2 CVE-2024-53677 below via @the_emmons. Very similar to Struts CVE-2023-50164 — payloads have…
0
20
0
@stephenfewer
Stephen Fewer
2 months
RT @FuzzySec: I have posted the slides for the talk @chompie1337 and I gave this past weekend at @h2hconference -> The Kernel Hacker’s Guid…
0
225
0
@stephenfewer
Stephen Fewer
2 months
We have published our @rapid7 analysis of the new Cleo vuln, now known as CVE-2024-55956. An unauthenticated file write affecting LexiCom, VLTrader, and Harmony versions 5.8.0.23 and below, that can be leveraged to achieve unauth RCE. Full analysis here:
Tweet media one
4
29
88