HomeCII/OTUrgent Jenkins RCE Bug Being Actively Exploited Faces Patch Delay

Urgent Jenkins RCE Bug Being Actively Exploited Faces Patch Delay

Published on

spot_img

A critical vulnerability in the Jenkins open-source automation server continues to pose a serious threat, even seven months after its initial disclosure. This vulnerability, known as CVE-2024-23897, was first revealed by the Jenkins team in January, highlighting a command line interface (CLI) path traversal flaw that could potentially allow unauthorized attackers to access arbitrary files on the controller file system. Despite being read-only in nature, this vulnerability could still enable attackers to extract cryptographic keys, which could then be used to escalate privileges and ultimately gain code execution capabilities. With a CVSS score of 9.8 out of 10, this vulnerability was classified as “critical.”

Yaniv Nizry, a vulnerability researcher for Sonar who discovered the bug, emphasized the severity of the issue, stating that if Jenkins were compromised, it could have significant implications as the software is integral to many businesses’ operations. Attackers could exploit this vulnerability to infiltrate production environments, inject malicious code, and establish a backdoor for further attacks, leading to potentially devastating consequences.

Despite the public disclosure of this critical vulnerability, it has been actively exploited by threat actors, as confirmed by the Cybersecurity and Infrastructure Security Agency (CISA). The agency recently added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, urging Federal Civilian Executive Branch (FCEB) agencies at risk to remediate within a two-week timeframe to mitigate potential threats.

Following the initial disclosure of the vulnerability, the Jenkins development team promptly released a security fix along with detailed information on potential exploit paths. However, it appears that not all developers implemented the fix, as evidenced by the discovery of 45,000 exposed instances across six continents by the Shadowserver Foundation just days after the vulnerability was disclosed. This led to immediate testing and exploitation attempts by both white-hat and black-hat hackers, resulting in the availability of proof of concept exploits within a short timeframe.

Subsequent reports indicated that CVE-2024-23897 exploits were being bought and sold among threat actors, with hundreds of related attacks primarily targeting entities in South Africa. The severity of the vulnerability was further underscored by notable incidents where threat actors leveraged it to compromise corporate GitHub accounts, access private repositories, and deploy ransomware attacks on IT systems, causing disruptions across Indian banks.

Experts like Nizry emphasize the importance of promptly addressing vulnerabilities in third-party packages like Jenkins to prevent potential security breaches and data compromises. Patch management and proactive security measures are crucial to mitigating the risks associated with known vulnerabilities, especially in widely-used software like Jenkins. As the threat landscape continues to evolve, staying vigilant and proactive in addressing security vulnerabilities is essential to safeguarding critical systems and data from malicious actors.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...