Caldera Catastrophe: Upgrade Now to Dodge Major RCE Bug!

The smart cookie who discovered a perfect 10-out-of-10-severity remote code execution bug in MITRE’s Caldera urges users to “immediately pull down the latest version.” This max-severity vulnerability affects all Caldera versions, except the latest fixed ones. Better patch up or risk having your security training hijacked!

Pro Dashboard

Hot Take:

Oh, MITRE, we trust you to train our security warriors, not provide an open invitation for digital marauders! Who knew that Caldera was a hotbed of vulnerabilities waiting to be exploited? It seems our friend Dawid Kulikowski has turned into a digital detective, spotlighting this 10-out-of-10 RCE bug. Can we get a round of applause for pulling the rug from under this rogue code? Meanwhile, keep your hands off those outdated versions unless you want your systems to become hacker heaven.

Key Points:

  • The RCE bug, CVE-2025-27364, affects all versions of Caldera released since 2017 until the latest patch.
  • This vulnerability can be triggered with default configurations if Go, Python, and GCC are present.
  • The bug involves deploying reverse shells through Manx and Sandcat agents.
  • MITRE was aware of the unauthenticated API endpoint’s potential vulnerability.
  • Kulikowski provided a PoC, advising to patch or limit exposure to the internet.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?