![Stephen Fewer Profile](https://pbs.twimg.com/profile_images/1512418933495799809/VrHtjHwl_x96.jpg)
Stephen Fewer
@stephenfewer
Followers
8K
Following
849
Statuses
766
Principal Security Researcher @rapid7. Decompiler @relyze. Core @metasploit dev 2009 - 2013. MSRC Top 100 2015. Pwn2Own 2011, 2021, 2024.
Ireland
Joined March 2009
Great analysis from @the_emmons on the recent SonicWall VPN auth bypass. Hijacking an active client SSL VPN connection is wild. Check out the analysis of CVE-2024-53704 here...
The Rapid7 ETR team just published an analysis of CVE-2024-53704, a SonicWall VPN authentication bypass that was announced earlier this month. Check it out!
1
7
23
RT @steventseeley: Very impressive work from @SinSinology, it just goes to show what determination and skill combined can achieve 😎
0
3
0
I observed that new checks were added to the code path for the rsh technique, which prevented an unregistered fortigate device being able to trigger the issue. I did not test if a registered device could still leverage the feature, but perhaps this is possible, AFAIK the rsh feature itself was not removed.
1
0
2
@MCKSysAr @0cdefender0 @watchtowrcyber Thanks! Will Dormann mentioned something similar (. I didn't come across this against my VM of 22.7r2.4. I wonder what the difference is in setups/versions or maybe my ruby install 🤔
1
0
2
@fullspectrumdev @WatchTowr Yup that would work. Unfortunately the target web server process doesn't fork on a new client connection, so you have to make your attempts in serial, but as you say, that doesn't affect targeting many targets in parallel.
0
0
0
We now have a @metasploit RCE exploit module in the pull queue for CVE-2024-55956 - an unauthenticated file write vulnerability affecting Cleo LexiCom, VLTrader, and Harmony which was exploited in the wild last month as 0day:
4
61
205
Fantastic opportunity to join the @rapid7 vuln research team in a manager role🚀
Rapid7's vulnerability research team is hiring a manager in Dublin, IE to run external CVD, shepherd new 0day research, and lead a small team of exceptionally skilled folks who are uncovering new forms of risk:
0
1
5
RT @metasploit: Our annual wrap-up is here with all of the hotness from 2024! The deepest of thanks to our 62 contributors from last year,…
0
14
0
RT @starlabs_sg: 🎄 All I Want for Christmas is a CVE-2024-30085 Exploit 🎄 As always, we at @starlabs_sg are sharing what we learnt. This ti…
0
48
0
RT @catc0n: Rapid7 analysis of Apache #Struts2 CVE-2024-53677 below via @the_emmons. Very similar to Struts CVE-2023-50164 — payloads have…
0
20
0
RT @FuzzySec: I have posted the slides for the talk @chompie1337 and I gave this past weekend at @h2hconference -> The Kernel Hacker’s Guid…
0
225
0
We have published our @rapid7 analysis of the new Cleo vuln, now known as CVE-2024-55956. An unauthenticated file write affecting LexiCom, VLTrader, and Harmony versions 5.8.0.23 and below, that can be leveraged to achieve unauth RCE. Full analysis here:
4
29
88