2025.12
Features & Enhancements
Vulnerability Management Hub (VMH)
- Performance & Scale: Optimized "Group-by" logic for significant performance gains when handling large datasets.
- Advanced Filtering & Sorting:
- Added a new Downstream Impact Type filter to help prioritize weaknesses based on their potential reach.
- Introduced the ability to sort the weakness series by IP address, Host, and Affected Entity.
- Improved table-wide sorting and filtering persistence to ensure a smoother navigation experience.
- Workflow Improvements:
- Added a new user-selectable status: Closed, providing better lifecycle tracking for remediated issues.
- Added a Notes pop-up for the "Group by Weakness ID" view, allowing users to quickly view or edit context without leaving the table.
- Users can now undo a Status Update in VMH, reducing accidental data entry errors.
High Value Targeting (HVT) & Advanced Data Pilfering (ADP)
- Enhanced Visibility: Updated the title copy for host and credential HVTs for better clarity and added distinct High-Value Targeting badges across the portal.
- Federal Availability: HVT and ADP capabilities are now fully enabled for NodeZero Federal environments.
Active Directory (AD) Tripwires
- Component Management: New portal UX flows streamline the update process for AD Tripwires components, including the AD Agent and Event Collector.
- Performance & Security:
- Improved security event query performance for faster threat detection.
- Resolved a security event ID overflow issue and improved local state error handling.
- Added the ability to archive deleted domains directly from the portal.
Platform & Usability Enhancements
- NodeZero Federal Updates: In addition to HVT/ADP, NodeZero Federal now supports Cloud-Based Hash Cracking, Threat Informed Perspectives, and the Vulnerability Management Hub.
- Vulnerability Risk Intelligence (VRI): Improved scanner integration with specific field mappings for Rapid7 and more descriptive error messages for invalid scanner file fields.
- Schedule Resiliency: To prevent automation failures, schedules owned by a deleted user are now automatically reassigned to an administrator rather than being deleted.
- Attack Path Visualization: The "Download PNG" feature now supports the export of highly complex attack paths.
New Attack Content
- Gladinet CentreStack & Triofox: Added a Rapid Response test for a hard-coded cryptographic vulnerability that allows unauthenticated attackers to bypass authentication and achieve Local File Inclusion (LFI).
- CVE-2025-14611: Gladinet CentreStack and Triofox use hardcoded AES cryptographic keys, allowing unauthenticated attackers to perform arbitrary local file inclusion and potentially gain full system compromise.
- CVE-2025-12480: An improper access control vulnerability in Gladinet Triofox allows unauthenticated attackers to bypass authentication via HTTP Host header manipulation and execute arbitrary code with SYSTEM privileges.
- xWiki: New test for a critical SQL injection vulnerability in the
getdeleteddocuments.vmtemplate, which could lead to full system compromise.- CVE-2025-32429: XWiki Platform contains a critical SQL injection vulnerability in the getdeleteddocuments.vm template, enabling remote attackers to execute arbitrary SQL commands without authentication.
- React2Shell: Added detection for a critical unauthenticated Remote Code Execution (RCE) vulnerability in React Server Components, including specific logic to identify WAF bypass attempts.
- CVE-2025-55182: Known as "React2Shell," this critical flaw in the React Server Components (RSC) Flight protocol allows unauthenticated attackers to achieve remote code execution through unsafe deserialization.
- FreePBX Suite: Released a series of tests for critical vulnerabilities including authentication bypass, SQL injection, and arbitrary file upload leading to RCE.
- CVE-2025-57819: Sangoma FreePBX versions 15, 16, and 17 are vulnerable to an authentication bypass and SQL injection that allows unauthenticated attackers to manipulate the database and execute remote code.
- CVE-2025-66039: FreePBX Endpoint Manager contains an authentication bypass vulnerability when using "webserver" authentication, allowing attackers to gain administrative access by providing an arbitrary Authorization header.
- CVE-2025-61675: FreePBX Endpoint Manager is affected by multiple authenticated SQL injection vulnerabilities in basestation and model configurations, allowing users with valid credentials to execute arbitrary queries.
- CVE-2025-61678: FreePBX Endpoint Manager contains an authenticated arbitrary file upload vulnerability via the fwbrand parameter, which can be leveraged by a known user to upload a webshell for remote code execution.
Platform Performance & Stability
- Compute Scaling: Improved hardware allocation logic for large-scale pentests to ensure consistent processing and prevent "stuck" operations.
- Data Processing: Enhanced performance for Asset matching and Attack vector tracing algorithms, resulting in faster post-operation analysis.
- External Request Logic: Refined internal pentest behavior to prevent unintended external metadata requests in AWS environments, specifically regarding AWS metadata service access.
Bug Fixes
- Pentest Visibility: Fixed an issue where the Scheduled Insider Threat pentest type was missing from the overview page.
- International Support: Resolved a provisioning bug for Tripwires accounts in non-English regions.
- Comparison UX: Fixed a UI bug in the Internal Operation Compare view that hindered data analysis.
- White Labeling: Removed the co-branding preview for child accounts to align