• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
40,000+ attacks in 3 days: critical confluence rce under active

40,000+ Attacks in 3 Days: Critical Confluence RCE Under Active Attacks

You are here: Home / General Cyber Security News / 40,000+ Attacks in 3 Days: Critical Confluence RCE Under Active Attacks
January 23, 2024

Destructive actors have started to actively exploit a not long ago disclosed critical security flaw impacting Atlassian Confluence Facts Heart and Confluence Server, inside a few times of community disclosure.

Tracked as CVE-2023-22527 (CVSS score: 10.), the vulnerability impacts out-of-date variations of the software package, allowing for unauthenticated attackers to achieve remote code execution on prone installations.

The shortcoming impacts Confluence Info Middle and Server 8 versions launched prior to December 5, 2023, as effectively as 8.4.5.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


But just times right after the flaw became general public understanding, virtually 40,000 exploitation attempts focusing on CVE-2023-22527 have been recorded in the wild as early as January 19 from far more than 600 exclusive IP addresses, according to both the Shadowserver Foundation and the DFIR Report.

The exercise is presently minimal “screening callback attempts and ‘whoami’ execution,” suggesting that menace actors are opportunistically scanning for susceptible servers for stick to-on exploitation.

A the greater part of the attacker IP addresses are from Russia (22,674), followed by Singapore, Hong Kong, the U.S., China, India, Brazil, Taiwan, Japan, and Ecuador.

Cybersecurity

About 11,000 Atlassian circumstances have been discovered to be available over the internet as of January 21, 2024, though it really is currently not acknowledged how numerous of them are susceptible to CVE-2023-22527.

“CVE-2023-22527 is a critical vulnerability within just Atlassian’s Confluence Server and Details Heart,” ProjectDiscovery scientists Rahul Maini and Severe Jaiswal claimed in a technical evaluation of the flaw.

“This vulnerability has the probable to permit unauthenticated attackers to inject OGNL expressions into the Confluence instance, thereby enabling the execution of arbitrary code and process instructions.”

Located this short article fascinating? Stick to us on Twitter  and LinkedIn to read much more special content material we post.


Some components of this posting are sourced from:
thehackernews.com

Previous Post: «apple issues patch for critical zero day in iphones, macs Apple Issues Patch for Critical Zero-Day in iPhones, Macs – Update Now
Next Post: BreachForums Founder Sentenced to 20 Years of Supervised Release, No Jail Time breachforums founder sentenced to 20 years of supervised release, no»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk
  • ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

Copyright © TheCyberSecurity.News, All Rights Reserved.