20 August 2024

CISA warns of actively exploited Jenkins RCE bug


CISA warns of actively exploited Jenkins RCE bug

The US Cybersecurity and Infrastructure Security Agency (CISA) has added a high-risk vulnerability affecting Jenkins, a widely-used open-source automation server, to its Known Exploited Vulnerabilities Catalog (KEV).

The flaw, tracked as CVE-2024-23897, is an improper access control issue, which exists due to the affected application does not disable a feature of its CLI command parser that replaces an "@" character followed by a file path in an argument with the file’s contents. A remote attacker can read arbitrary files on the Jenkins controller file system, leading to arbitrary code execution.

Jenkins developers released patches to address the bug in January 2024. Shortly after, multiple proof-of-concept (PoC) exploits emerged online, with exploitation attempts being reported just one day later.

In March, Trend Micro reported exploitation attempts against CVE-2024-23897, and in July, cybersecurity firm CloudSEK observed the exploitation of the vulnerability by the IntelBroker threat actors. The group allegedly exploited the flaw to compromise IT service provider BORN Group.

Earlier this month, networking company Juniper Networks reported that the RansomEXX ransomware gang exploited CVE-2024-23897 to breach the systems of Brontoo Technology Solutions, an Indian technology services provider catering to banks. The attack resulted in widespread disruptions to retail payment systems across India.

That being said, organizations that have yet to update their Jenkins instances are strongly advised to do so as soon as possible.

Back to the list

Latest Posts

What is Vulnerability Management? A Beginner's Guide

What is Vulnerability Management? A Beginner's Guide

In this article will try to cover basics of vulnerability management process and why it is important to every company.
11 September 2024
Cyber Security Week in Review: September 6, 2024

Cyber Security Week in Review: September 6, 2024

In brief: the US charges Russian GRU hackers for attacks on Ukraine, Apache, Cisco, Zyxel patch high-risk flaws, Google fixes Android zero-day, and more.
6 September 2024
Threat actors using MacroPack Red Team framework to deploy Brute Ratel, Havoc and PhantomCore

Threat actors using MacroPack Red Team framework to deploy Brute Ratel, Havoc and PhantomCore

Some of the documents appeared to be part of legitimate Red Team exercises, while other were intended for malicious purposes.
5 September 2024