The second week of December 2025 unveiled a wave of critical zero-day exploitation and supply chain risks across mobile, enterprise, and identity stacks. A CVSS 10.0 RCE in Apache Tika threatens widespread Atlassian ecosystems, while actively exploited WebKit zero-days in iOS expose users to targeted espionage campaigns. Concurrently, a Windows kernel privilege escalation (CVE-2025-62221) is granting attackers SYSTEM-level access in the wild, and new React Server Components flaws are opening doors to unauthenticated denial-of-service and source code disclosure. Beyond software flaws, the 700Credit breach exposed 5.8 million records via unsecured third-party APIs, and a sophisticated AiTM phishing campaign is successfully bypassing Okta and Microsoft 365 MFA protections, underscoring the urgent need for patch management and identity hardening.
1.1. Actively Exploited iOS/iPadOS WebKit Zero-Days (CVE-2025-43529, CVE-2025-14174)
Apple patched two WebKit zero-day vulnerabilities in iOS 26 / iPadOS 26 and earlier that allow arbitrary code execution via malicious web content and are confirmed to be actively exploited in targeted attacks. Additional fixes include WebKit memory corruption bugs and high-impact flaws in the kernel, App Store, and core apps/frameworks.
Action: Update to iOS 26.2 / iPadOS 26.2 immediately.
Reference: https://support.apple.com/en-ae/125884
1.2. React Server Components – DoS & Source Code Exposure (CVE-2025-55184, CVE-2025-67779, CVE-2025-55183)
New vulnerabilities in React Server Components (react-server-dom-* packages) can enable pre-authentication denial-of-service and server-side source code disclosure, affecting versions 19.0.0–19.2.2 depending on the CVE. The issues were discovered after the React2Shell RCE (CVE-2025-55182) and impact Server Functions exposed over HTTP.
Action: Upgrade to the latest React Server Components releases as recommended by the React team.
Reference: https://react.dev/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components
1.3. Windows Cloud Files Driver Privilege Escalation (CVE-2025-62221)
A use-after-free vulnerability in the Windows Cloud Files Mini Filter Driver (cldflt.sys) allows local attackers to escalate privileges to SYSTEM. The flaw is widely deployed across Windows environments and is confirmed to be actively exploited.
Action: Apply Microsoft’s December 2025 security updates across all Windows endpoints and servers.
Reference: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-62221
Attack Campaigns
700Credit Data Breach – 5.8M Individuals Affected
700Credit disclosed a breach impacting 5,836,521 individuals after attackers abused a third-party API linked to its dealer application (700Dealer.com). Exposed data includes names, addresses, dates of birth, and Social Security numbers collected between May and October 2025.
Action: Affected dealers should notify impacted customers; individuals should monitor credit reports and consider fraud alerts or credit freezes.
References:
AiTM Phishing Bypassing MFA for Microsoft 365 & Okta
Datadog Security Labs reported an active Adversary-in-the-Middle (AiTM) phishing campaign that proxies Okta and Microsoft 365 login flows to steal valid session cookies, effectively bypassing MFA. Emails spoof HR/benefits notices and leverage compromised marketing platforms and lookalike Okta domains.
Action:
Enforce phishing-resistant MFA where possible (FIDO2/WebAuthn).
Monitor sign-in anomalies and unusual Okta/M365 sessions.
Block known malicious domains and shorten URL abuse.
Reference: https://securitylabs.datadoghq.com/articles/investigating-an-aitm-phishing-campaign-m365-okta/
Security News & Updates
3.1. Atlassian Patches Critical Apache Tika XXE and Other Third-Party Flaws
Atlassian released updates fixing nearly 30 vulnerabilities across Bamboo, Bitbucket, Confluence, Crowd, Fisheye/Crucible, Jira, and Jira Service Management. Notably, CVE-2025-66516 (CVSS 10.0) is a critical Apache Tika XXE issue that can lead to information disclosure, SSRF, DoS, or RCE via malicious PDFs.
Action: Upgrade all affected Atlassian Data Center and Server products to the latest fixed versions.
Reference: https://confluence.atlassian.com/security/security-bulletin-december-11-2025-1689616574.html
3.2 MITRE 2025 Top 25 Most Dangerous Software Weaknesses
MITRE published the 2025 CWE Top 25 list, with XSS, SQL injection, and CSRF occupying the top three spots. New entries emphasize classic, stack-based, and heap-based buffer overflows, improper access control, and unthrottled resource allocation.
Action: Integrate the CWE Top 25 into secure development, code review, and AppSec testing programs.
Reference: https://cwe.mitre.org/top25/archive/2025/2025_cwe_top25.html
Microsoft December 2025 Patch Tuesday – 56 Vulnerabilities Fixed
Microsoft’s December 2025 Patch Tuesday addresses 56 vulnerabilities across Windows, Office, Exchange, PowerShell, Azure Monitor Agent, and Hyper-V, including three zero-days:
CVE-2025-62221 – Windows Cloud Files Mini Filter Driver LPE (actively exploited)
CVE-2025-64671 – Command injection in GitHub Copilot for JetBrains
CVE-2025-54100 – Command injection in Windows PowerShell
The release also includes 19 RCE and 28 elevation-of-privilege fixes, many in Windows kernel drivers.
Action: Ensure automated patch deployment remains enabled and prioritize systems exposed to user interaction and internet access.
Reference: https://support.microsoft.com/en-us/topic/december-9-2025-kb5072033-os-build-26100-7462-fca31d8d-5fe8-4b5e-9591-6641ef1d26a1
Summary
Vulnerability Details
700Credit Data Breach Exposes Personal Information of Over 5.8 Million Individuals
Security News