Recently, Adobe took urgent steps to release out-of-band security updates aimed at fixing a critical vulnerability in ColdFusion, known as CVE-2024-53961. This flaw, with a CVSS score of 7.4, involves an improper limitation of a path to a restricted directory, also known as ‘Path Traversal.’ If exploited, this vulnerability could potentially lead to arbitrary file system readings.
The impact of this vulnerability is significant as it affects Adobe ColdFusion versions 2023 and 2021. The severity of the issue prompted Adobe to issue a warning regarding the availability of a proof-of-concept exploit code that cybercriminals could abuse to access sensitive information on compromised systems.
The disclosure of the vulnerability came from a researcher identifying themselves online as ma4ter, who reported the issue to Adobe. In response, the software company promptly released security updates for ColdFusion versions 2023 and 2021 to address the critical flaw.
Users are strongly advised to update their installations to the latest versions provided by Adobe to mitigate the risk of exploitation. For ColdFusion 2023, the recommended updated version is Update 12, while for ColdFusion 2021, users should install Update 18. Following these guidelines and staying up to date with patch releases is crucial to ensure the security and integrity of ColdFusion installations.
At present, it remains unclear whether there have been any instances of cyberattacks leveraging this vulnerability in the wild. However, organizations and users are urged to take proactive measures by applying the necessary security updates as soon as possible to prevent potential exploitation by threat actors.
This latest security incident involving ColdFusion follows a previous one reported in December by the U.S. Cybersecurity and Infrastructure Security Agency (CISA). In that instance, CISA added another Adobe ColdFusion vulnerability, tracked as CVE-2024-20767, to its Known Exploited Vulnerabilities (KEV) catalog. This particular flaw, with a CVSS score of 7.4, pertains to an Improper Access Control issue affecting ColdFusion versions 2023.6, 2021.12, and earlier. Exploitation of this vulnerability allows attackers to gain unauthorized access to files, provided an admin panel is exposed.
In light of these security concerns, users are encouraged to stay informed about the latest developments in the cybersecurity landscape and follow reputable sources for updates and advisories. By remaining vigilant and proactive in implementing security measures, organizations can reduce the risk of falling victim to potential cyber threats targeting vulnerable software like ColdFusion.
To stay updated on cybersecurity news and developments, follow reputable sources like @securityaffairs on Twitter, as well as on Facebook and Mastodon. Additionally, connect with Pierluigi Paganini on LinkedIn for expert insights and analysis on the latest security trends and vulnerabilities.
As the cybersecurity landscape continues to evolve, maintaining a proactive stance towards security best practices and timely updates is essential to safeguard against emerging threats and vulnerabilities. Adobe’s swift response in releasing security updates for ColdFusion underscores the importance of addressing critical vulnerabilities promptly to mitigate potential risks to users and organizations.

