• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
atlassian confluence hit by newly actively exploited zero day – patch

Atlassian Confluence Hit by Newly Actively Exploited Zero-Day – Patch Now

You are here: Home / General Cyber Security News / Atlassian Confluence Hit by Newly Actively Exploited Zero-Day – Patch Now
October 5, 2023

Atlassian has launched fixes to comprise an actively exploited critical zero-working day flaw impacting publicly accessible Confluence Facts Center and Server circumstances.

The vulnerability, tracked as CVE-2023-22515, is remotely exploitable and enables external attackers to develop unauthorized Confluence administrator accounts and obtain Confluence servers.

It does not impact Confluence versions prior to 8… Confluence web-sites accessed via an atlassian.net area are also not vulnerable to this issue.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

The organization software program products and services company reported it was built aware of the issue by “a handful of consumers.” It has been resolved in the next versions of Confluence Details Center and Server –

  • 8.3.3 or later on
  • 8.4.3 or later on, and
  • 8.5.2 (Very long Term Guidance release) or afterwards

The enterprise, even so, did not disclose any further details about the nature and scale of the exploitation, or the root bring about of the vulnerability.

Shoppers who are unable to use the updates are recommended to prohibit exterior network obtain to the afflicted scenarios.

“Also, you can mitigate identified attack vectors for this vulnerability by blocking entry to the /setup/* endpoints on Confluence scenarios,” Atlassian reported. “This is probable at the network layer or by building the following adjustments to Confluence configuration data files.”

The enterprise has also offered the adhering to indicators of compromise (IoCs) to ascertain if an on-premise occasion has been probably breached –

  • sudden users of the confluence-administrator team
  • unexpected freshly produced user accounts
  • requests to /setup/*.motion in network entry logs
  • presence of /setup/setupadministrator.motion in an exception information in atlassian-confluence-security.log in the Confluence home listing

“If it is identified that your Confluence Server/DC occasion has been compromised, our advice is to straight away shut down and disconnect the server from the network/Internet,” Atlassian reported.

Cybersecurity

“Also, you may possibly want to promptly shut down any other devices which likely share a consumer foundation or have typical username/password combos with the compromised system.”

“It can be abnormal, while not unparalleled, for a privilege escalation vulnerability to have a critical severity score,” Swift7’s Caitlin Condon stated, incorporating the flaw is “commonly extra steady with an authentication bypass or distant code execution chain than a privilege escalation issue by by itself.”

With flaws in Atlassian Confluence scenarios extensively exploited by menace actors in the earlier, it’s advised that clients update to a preset variation right away, or put into action suitable mitigations.

Found this article exciting? Follow us on Twitter  and LinkedIn to study far more unique content material we publish.


Some components of this report are sourced from:
thehackernews.com

Previous Post: «researchers link dragonegg android spyware to lightspy ios surveillanceware Researchers Link DragonEgg Android Spyware to LightSpy iOS Surveillanceware
Next Post: Apple Rolls Out Security Patches for Actively Exploited iOS Zero-Day Flaw apple rolls out security patches for actively exploited ios zero day»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.