Your file transfer gateway is now an active execution point for attackers. π
CVE-2026-25108 Β· Severity 9.8 Β· Critical OS Command Injection in Soliton Systems FileZen.
The @[CISA](urn:li:organization:13010360) has confirmed active exploitation of @[Soliton Systems](urn:li:organization:166291) FileZen appliances within the last 24 hours. This vulnerability allows an unauthenticated attacker to execute arbitrary system commands via a crafted network request.
Attackers are currently leveraging this to establish initial access and move laterally into corporate networks. Because these devices handle sensitive file transfers, they serve as a high-value bridge between internal and external segments.
The uncomfortable truth: Your secure file transfer appliance is a prime target for attackers looking to bypass your perimeter without needing stolen credentials.
β Update all @[Soliton Systems](urn:li:organization:166291) FileZen instances to version 5.0.11 immediately.
β Reset all administrative and account passwords once the patch is applied.
β Audit your network logs for unusual outbound traffic originating from file transfer nodes.
Have you confirmed that your file transfer appliances are fully patched and isolated from direct internet access? π
#Cybersecurity #DataSecurity #ZeroTrust #PatchManagement #CISO #CodeDefence
