Thursday, December 5, 2024
HomeAdobeCISA Urgent Warning: Adobe ColdFusion Bug Exploited As A Zero-day in the...

CISA Urgent Warning: Adobe ColdFusion Bug Exploited As A Zero-day in the Wild

Published on

SIEM as a Service

CISA has updated its list of security flaws that have been actively exploited, including a critical vulnerability affecting Adobe ColdFusion versions 2021 and 2018.

The vulnerability is tracked as (CVE-2023-26360), Adobe ColdFusion Improper Access Control flaw. These flaws provide serious threats to the federal enterprise and are frequently used as attack vectors by malicious actors.

“Adobe is aware that CVE-2023-26360 has been exploited in the wild in very limited attacks targeting Adobe ColdFusion,” the company said.

- Advertisement - SIEM as a Service

The report says using low-complexity techniques that don’t necessitate user interaction, the flaw can be remotely exploited by unauthenticated attackers.

As a zero-day exploit, the application server vulnerability was patched by Adobe in ColdFusion 2018 Update 16 and ColdFusion 2021 Update 6.

Although installations of ColdFusion 2016 and ColdFusion 11 are likewise vulnerable, Adobe no longer offers security updates for those versions.

Administrators are urged to implement the security configuration settings described in the lockdown instructions for ColdFusion 2018 and ColdFusion 2021 as soon as possible (within 72 hours, if practicable), along with the security upgrades.

CISA’s Recommendations

All U.S. Federal Civilian Executive Branch (FCEB) entities have until April 5 to protect their systems from potential attacks employing CVE-2023-26360 flaws, according to CISA.

All organizations are strongly advised to patch their systems to avoid exploitation attempts that might target their networks, even though the binding operational directive (BOD 22-01) driving CISA’s mandate only applies to federal agencies.

“CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice,” CISA reports.

In a comment to Adobe’s blog post, Charlie Arehart—one of the two security researchers credited with finding and disclosing the CVE-2023-26360 bug, warned ColdFusion administrators of the real significance of the security patches and the urgency with which they must be patched.

“This security fix is far more important than the wording of this blog post suggests and even that the update technotes would suggest,” Arehart warned.

“To be clear, I HAVE personally seen both the ‘arbitrary code execution‘ and ‘arbitrary file system read’ vulnerabilities having been perpetrated on multiple servers and it IS grave.”

Network Security Checklist – Download Free E-Book

Recent CISA Warnings

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

HCL DevOps Deploy / Launch Vulnerability Let Embed arbitrary HTML tags

Recently identified by security researchers, a new vulnerability in HCL DevOps Deploy and HCL...

CISA Warns of Zyxel Firewalls, CyberPanel, North Grid, & ProjectSend Flaws Exploited in Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has issued warnings about several vulnerabilities being...

HackSynth : Autonomous Pentesting Framework For Simulating Cyberattacks

HackSynth is an autonomous penetration testing agent that leverages Large Language Models (LLMs) to...

Fuji Electric Indonesia Hit by Ransomware Attack

Fuji Electric Indonesia has fallen victim to a ransomware attack, impacting its operations and...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

HCL DevOps Deploy / Launch Vulnerability Let Embed arbitrary HTML tags

Recently identified by security researchers, a new vulnerability in HCL DevOps Deploy and HCL...

CISA Warns of Zyxel Firewalls, CyberPanel, North Grid, & ProjectSend Flaws Exploited in Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has issued warnings about several vulnerabilities being...

HackSynth : Autonomous Pentesting Framework For Simulating Cyberattacks

HackSynth is an autonomous penetration testing agent that leverages Large Language Models (LLMs) to...