Confluence vulnerabilities under active ransomware exploitation – Security

The Atlassian Confluence Data Centre and Server vulnerability initially revealed recently is under active exploitation.

Confluence vulnerabilities under active ransomware exploitation


Security business Rapid7 stated it has actually seen aggressors making use of incorrect authorisation vulnerability designated CVE-2023-22518.

Rapid7 stated an execution chain that is “constant throughout several environments” shows “possible mass exploitation of susceptible internet-facing Atlassian Confluence servers”.

If an attack succeeds, Rapid7’s post stated, the Cerber ransomware is set up on the made use of Confluence server.

Atlassian’s upgraded advisory stated it had actually gotten a minimum of one consumer exploitation report, which it had actually updated the CVSS rating for this vulnerability from 9.1 to 10.

Dr Johannes Ullrich of the SANS Institute composed that the institute has seen traffic attempting to assault the Confluence URLs recognized in Atlassian’s advisory, in addition to this URL: “/ rest/api/user? username=”.

He composed that the institute has actually identified an IP address, 206.189.179.132, which is a recognized enemy: “no complete stranger to our logs”.

Other enemy IPs in the SANS Institute’s logs consist of 103.207.14.235 and 103.207.14.196 from India, 104.238.130.6 from the United States, and 99.245.96.12 from Canada.

Rapid7 recognized 3 other IPs: 193.176.179.41, 193.43.72.11, and 45.145.6.112.

Like this post? Please share to your friends:
Leave a Reply

;-) :| :x :twisted: :smile: :shock: :sad: :roll: :razz: :oops: :o :mrgreen: :lol: :idea: :grin: :evil: :cry: :cool: :arrow: :???: :?: :!: