Caldera Catastrophe: Upgrade Now to Dodge Major RCE Bug!
The smart cookie who discovered a perfect 10-out-of-10-severity remote code execution bug in MITRE’s Caldera urges users to “immediately pull down the latest version.” This max-severity vulnerability affects all Caldera versions, except the latest fixed ones. Better patch up or risk having your security training hijacked!

Hot Take:
Oh, MITRE, we trust you to train our security warriors, not provide an open invitation for digital marauders! Who knew that Caldera was a hotbed of vulnerabilities waiting to be exploited? It seems our friend Dawid Kulikowski has turned into a digital detective, spotlighting this 10-out-of-10 RCE bug. Can we get a round of applause for pulling the rug from under this rogue code? Meanwhile, keep your hands off those outdated versions unless you want your systems to become hacker heaven.
Key Points:
- The RCE bug, CVE-2025-27364, affects all versions of Caldera released since 2017 until the latest patch.
- This vulnerability can be triggered with default configurations if Go, Python, and GCC are present.
- The bug involves deploying reverse shells through Manx and Sandcat agents.
- MITRE was aware of the unauthenticated API endpoint’s potential vulnerability.
- Kulikowski provided a PoC, advising to patch or limit exposure to the internet.