• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hackers exploited coldfusion vulnerability to breach federal agency servers

Hackers Exploited ColdFusion Vulnerability to Breach Federal Agency Servers

You are here: Home / General Cyber Security News / Hackers Exploited ColdFusion Vulnerability to Breach Federal Agency Servers
December 6, 2023

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned of lively exploitation of a significant-severity Adobe ColdFusion vulnerability by unidentified risk actors to obtain original entry to government servers.

“The vulnerability in ColdFusion (CVE-2023-26360) offers as an poor obtain handle issue and exploitation of this CVE can result in arbitrary code execution,” CISA mentioned, incorporating an unnamed federal company was targeted concerning June and July 2023.

The shortcoming affects ColdFusion 2018 (Update 15 and earlier variations) and ColdFusion 2021 (Update 5 and before variations). It has been dealt with in versions Update 16 and Update 6, unveiled on March 14, 2023, respectively.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Approaching WEBINAR Cracking the Code: Master How Cyber Attackers Exploit Human Psychology

Ever wondered why social engineering is so efficient? Dive deep into the psychology of cyber attackers in our approaching webinar.

Join Now

It was added by CISA to the Recognized Exploited Vulnerabilities (KEV) catalog a day afterwards, citing proof of lively exploitation in the wild. Adobe, in an advisory introduced about that time, mentioned it is knowledgeable of the flaw getting “exploited in the wild in extremely minimal attacks.”

The company famous that at the very least two public-struggling with servers have been compromised using the flaw, both of those of which had been jogging out-of-date variations of the software.

“Moreover, a variety of commands were being initiated by the risk actors on the compromised web servers the exploited vulnerability authorized the threat actors to drop malware making use of HTTP Put up commands to the listing path connected with ColdFusion,” CISA observed.

There is evidence to counsel that the destructive action is a reconnaissance energy carried out to map the broader network, despite the fact that no lateral motion or details exfiltration has been noticed.

In one particular of the incidents, the adversary was observed traversing the filesystem and uploading various artifacts to the web server, which include binaries that are capable of exporting web browser cookies as very well as malware made to decrypt passwords for ColdFusion facts sources.

A 2nd occasion recorded in early June 2023 entailed the deployment of a distant obtain trojan that is a modified edition of the ByPassGodzilla web shell and “makes use of a JavaScript loader to infect the gadget and needs interaction with the actor-managed server to complete steps.”

Cybersecurity

Also carried out by the adversary had been attempts to exfiltrate the Windows Registry information as very well as unsuccessfully obtain facts from a command-and-handle (C2) server.

“For the duration of this incident, analysis strongly indicates that the menace actors very likely viewed the info contained in the ColdFusion seed.houses file by means of the web shell interface,” CISA stated.

“The seed.qualities file includes the seed benefit and encryption technique utilized to encrypt passwords. The seed values can also be applied to decrypt passwords. No destructive code was uncovered on the sufferer program to indicate the threat actors attempted to decode any passwords employing the values observed in seed.homes file.”

Discovered this short article exciting? Comply with us on Twitter  and LinkedIn to read through extra distinctive content we post.


Some elements of this posting are sourced from:
thehackernews.com

Previous Post: «atlassian releases critical software fixes to prevent remote code execution Atlassian Releases Critical Software Fixes to Prevent Remote Code Execution
Next Post: Scaling Security Operations with Automation scaling security operations with automation»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.