(9/08/2023) Cisco announced that a previously unknown vulnerability was being exploited by ransomware groups against Cisco VPNs. There is not yet a security patch for the vulnerability; however, multi-factor authentication (MFA) is effective at mitigating these attacks. There is not yet a security patch but Cisco has recommended some workarounds in the interim.
Corvus Insurance has become aware that threat actors are targeting Cisco ASA SSL-VPN devices. These attacks are resulting in enterprise-wide ransomware such as Akira and LockBit. We recommend organizations using Cisco VPNs immediately enforce multi-factor authentication (MFA) for all user accounts on the VPN device.
Attackers are using credential stuffing attacks leveraging weak or default passwords or are employing brute-force tactics against devices without MFA or where MFA was not enabled on every account. These attacks don’t appear to be targeting any particular industries and seem to be purely opportunistic.
_________________________________
Adobe released an advisory detailing critical security flaws (CVE-2023-38204, CVE-2023-38205, and CVE-2023-38206) in their ColdFusion product, often used for web application development and delivery. The vulnerabilities allow for an unauthenticated attacker to execute arbitrary code or commands. Adobe reports that at least one of the flaws is being actively exploited. Security patches have been released and should be applied as soon as possible.
Update Number: Update 2 and earlier versions
Platform: All
Update Number: Update 8 and earlier versions
Platform: All
Update Number: Update 18 and earlier versions
Platform: All
Attackers can execute arbitrary code or commands against unpatched devices, gaining a foothold into the network. From there the attacker would be able to conduct further exploitation and potentially move around the network.
_________________________________
Confluence issued a security advisory for several vulnerabilities. The flaws, CVE-2023-22505, CVE-2023-22506, CVE-2023-22508, affect Confluence Data Center & Server and Bamboo Data Center commonly used for collaboration and development. The vulnerabilities allow an unauthenticated attacker to execute remote code and take control of an affected system. Confluence released security updates, and we recommend organizations upgrade to the most recent version as soon as possible.
An attacker could gain unauthenticated access and execute remote code on an affected system. Corvus has observed similar vulnerabilities lead to data theft and extortion as well as ransomware attacks.
We encourage your organization to take the following steps to mitigate against potential attack:
_________________________________
On July 18, 2023, Citrix released an advisory detailing a critical security flaw in NetScaler Gateway (formerly Citrix Gateway) and NetScaler ADC (formerly Citrix Application Delivery Controller). NetScaler Gateway is commonly used as a remote access solution and NetScaler ADC is a networking appliance for web applications. The security flaw (CVE-2023-3519) allows a remote, unauthenticated attacker to perform arbitrary code execution. Citrix reports that this vulnerability is being actively exploited by attackers. A security patch has been released and should be applied as soon as possible.
Note: NetScaler ADC and NetScaler Gateway version 12.1 is now End Of Life (EOL) and is vulnerable.
This bulletin only applies to customer-managed NetScaler ADC and NetScaler Gateway. Customers using Citrix-managed cloud services or Citrix-managed Adaptive Authentication do not need to take any action.
Without a security patch, an unauthenticated remote attacker may be able to gain access to an affected Gateway or ADC appliance and execute arbitrary code. From there the attacker could move around the network and conduct further exploitation. Corvus has observed similar vulnerabilities lead to ransomware attacks.
NetScaler ADC and NetScaler Gateway 13.1-49.13 and later releases
NetScaler ADC and NetScaler Gateway 13.0-91.13 and later releases of 13.0
NetScaler ADC 13.1-FIPS 13.1-37.159 and later releases of 13.1-FIPS
NetScaler ADC 12.1-FIPS 12.1-55.297 and later releases of 12.1-FIPS
NetScaler ADC 12.1-NDcPP 12.1-55.297 and later releases of 12.1-NDcPP
Note: Please note that Citrix ADC and Citrix Gateway versions prior to 12.1 are End of Life (EOL). Customers are recommended to upgrade their appliances to one of the supported versions that address the vulnerabilities.
Resources