The American Cyber Security and Infrastructure Security Agency (CISA) GIT is warning a hackers of hackers exploiting a arbitrary code execution defects in the GIT distributed control system.
The agency has added vulnerability to its known exploited weaknesses (KV) catalogs and set the patches for federal agencies by 15 September.
The GIT version controls the control system software development teams to track codebase changes over time. The library is the backbone of modern software cooperation, which serves as a basis for platforms such as Github, Gitlab and Bitbucket.
The GIT has a high-seriousness score of the exploited vulnerability and has been tracked in the form Cve-2025-48384This configuration files stems from the deficiency of git car returns (\ R) characters.
In the midst of how the guit writes and reads these characters, a mismatch causes the wrong submodule path resolution.
Attackers can exploit this issue \R And a prepared symlink with a malicious hook setup, leading to arbitrary code execution on the machines of users that clones them.
Guit discover this issue On July 8, 2025And the following versions pushed reforms: 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1.
If it is not possible to update, the recommendation is meant to avoid recurrence of repetition submudule clone from incredible sources, disable the global hook globally core.hookspathOr apply only audited submodules.
With guit defect, Sisa also added Kew Catalog Two Citrix sessions recording weaknesses that set the seller in November 2024, namely Cve-2024-8068 and Cve-2024-8069. Both security issues received a moderate-seriousness score.
The CVE-2024-8068 allows a certified user to increase privileges in the Networkus service account as a session recording server in the same active directory domain.
CVE-2024-8069 A certified intranet enables the user to achieve limoted codes with networkservice privileges through deserialization of indirect data.
Flaws 2407 Hotfix 24.5.200.8 (CR), 1912 LTSR before CU9 Hotfix 19.12.9100.6, 2203 LTSR before CU5 Hotfix 22.03.5100.11, and 2402 LTSR before CU1 Hotfix 24.0200.1200.1200.1200.1200.1200.1200.1200.1200.1200.1200.1200.1200.1200.1200.1200.1200.1200.1200.1200.1200.1200.1200.1200.1 200.1200.1200.1200.1200.1200.1200.1200.1200.1200.1200.1200.1200.1200.1200.1200.1200.1200.1200.1200.1200.1200.1.1.1.1.1.1.1.1.1.1.1.1.1.1. With CU1.
CISA has given the same time limit to organizations, on 15 September, to implement the reforms provided by the seller or to prevent the use of products.