Alert about Critical Jenkins Weakness Used in Ransomware Incidents

Aug 20, 2024Ravie LakshmananWeakness / Ransomware

The Cybersecurity and Infrastructure Security Agency (CISA) in the United States has included a severe security issue affecting Jenkins in its Active Exploited Weaknesses (KEV) catalog due to its

CISA Warns of Critical Jenkins Vulnerability Exploited in Ransomware Attacks

Aug 20, 2024Ravie LakshmananWeakness / Ransomware

CISA Warns of Critical Jenkins Vulnerability Exploited in Ransomware Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) in the United States has included a severe security issue affecting Jenkins in its Active Exploited Weaknesses (KEV) catalog due to its involvement in ransomware incidents.

The flaw, identified as CVE-2024-23897 (CVSS score: 9.8), is a path traversal weakness that has the potential to trigger code execution.

CISA mentioned in a statement, “Jenkins Command Line Interface (CLI) features a path traversal vulnerability that grants attackers restricted read privileges to specific files, thereby leading to code execution.”

Cybersecurity

This weakness was initially revealed by security experts at Sonar in January 2024 and resolved in Jenkins versions 2.442 and LTS 2.426.3 by deactivating the command parser functionality.

Earlier this year, Trend Micro reported multiple attack incidents originating from the Netherlands, Singapore, and Germany, highlighting active trading of remote code execution exploits for the vulnerability.

Jenkins Vulnerability Ransomware Attacks

Recent reports from CloudSEK and Juniper Networks have unveiled a series of cyber assaults leveraging CVE-2024-23897 to infiltrate organizations like BORN Group and Brontoo Technology Solutions.

The incidents have been linked to a malicious actor identified as IntelBroker and the RansomExx ransomware crew.

Cybersecurity

CloudSEK affirmed, “CVE-2024-23897 is an unauthenticated LFI vulnerability enabling malicious individuals to read arbitrary files on the Jenkins server. This vulnerability originates from inadequate input validation, allowing attackers to manipulate particular parameters and deceive the server into opening and showing contents of sensitive files.”

Jenkins Vulnerability Ransomware Attacks

Considering the ongoing exploitation of this vulnerability, Federal Civilian Executive Branch (FCEB) agencies have until September 9, 2024, to implement the necessary patches and safeguard their networks against active dangers.

Did you find this article interesting? Stay tuned on our Twitter and LinkedIn for more exclusive content updates.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.