Mirai Botnets Strike Again: Wazuh Servers Vulnerability Exploited!
Akamai warns of Mirai botnets exploiting a critical remote code execution vulnerability in Wazuh servers. The flaw, patched in version 4.9.1, allows attackers with API access to execute malicious code. Two Mirai campaigns have been spotted targeting this vulnerability. Remember, when it comes to servers, always patch before you hatch!

Hot Take:
In a world where technology is supposed to save us, it’s ironic that even our security platforms need saving from cyber-villains. Wazuh, a platform meant to detect threats, ironically became the prey of Mirai botnets. It’s like a guard dog that needs a guard cat to keep it safe. Talk about a plot twist!
Key Points:
- A critical vulnerability, CVE-2025-24016, affected Wazuh servers, allowing remote code execution.
- Mirai botnets have exploited this vulnerability since March, targeting Wazuh servers.
- The vulnerability affects Wazuh versions from 4.4.0 to just before 4.9.1.
- Akamai has identified two separate Mirai campaigns targeting this flaw.
- Indicators of compromise (IoC) have been made available by Akamai and Kaspersky to help detect these attacks.
Already a member? Log in here