By LBT Technology Group, LLC. on Thursday, 18 April 2024
Category: Security

Active exploit of Atlassian Confluence

Threat update

This Cybersecurity Threat Advisory details the exploitation of the critical vulnerability CVE-2023-22518 in the Atlassian Confluence Data Center and Server. Attackers are deploying a Linux variant of Cerber (aka C3RB3R) ransomware. This allows unauthenticated attackers to reset Confluence and create administrator accounts, granting them complete control over affected systems.

Technical Detail and Additional Info

What is the threat?

CVE-2023-22518 is being exploited to gain a foothold on the targeted Atlassian Confluence application servers. This critical vulnerability allows an unauthenticated attacker to reset the application and establish a new administrator account.

Here is the exploit chain:

Why is it noteworthy?

The exploit targets a vulnerability in Atlassian's software, allowing remote attackers to execute arbitrary code on vulnerable systems. Threat actors have utilized this vulnerability to deploy a variant of the Cerber ransomware tailored for Linux environments. The exploit likely involves sending crafted requests to the affected Atlassian products, resulting in the execution of malicious code. 

What is the exposure or risk?

The vulnerability has a high CVSS score of 9.1 due to the ease of exploitation, remote access potential, and data encryption consequences. Organizations utilizing unpatched Atlassian Confluence Server or Data Center versions are at risk. There could be potential losses, including encrypted data, data exfiltration, operational disruption, financial losses due to downtime, and potential ransom demands. 

What are the recommendations?

 LBT Technology Group recommends the following actions to secure your Atlassian servers against this threat:

References

 For more in-depth information about the recommendations, please visit the following links:

If you have any questions, please contact LBT's Sales Engineer.

Related Posts

Leave Comments