https://vulnerability.circl.lu/comments/feedMost recent comment.2024-12-27T15:17:45.266863+00:00Vulnerability Lookupinfo@circl.lupython-feedgenContains only the most 10 recent comments.https://vulnerability.circl.lu/comment/92cdf9dd-1009-427b-8181-b444dc288f89INCIDENT: Threat Actors Currently Mass-Exploiting Cleo Servers (0-day-ish) đź‘ľ (source reddit)2024-12-27T15:17:45.269721+00:00Alexandre Dulaunoyhttp://vulnerability.circl.lu/user/adulau- [INCIDENT: Threat Actors Currently Mass-Exploiting Cleo Servers (0-day-ish) đź‘ľ ](https://www.reddit.com/r/sysadmin/comments/1haqguq/incident_threat_actors_currently_massexploiting/?rdt=59586)
https://www.huntress.com/blog/threat-advisory-oh-no-cleo-cleo-software-actively-being-exploited-in-the-wild
On December 3, Huntress identified an emerging threat involving Cleo’s LexiCom, VLTransfer, and Harmony software, commonly used to manage file transfers. We’ve directly observed evidence of threat actors exploiting this software en masse and performing post-exploitation activity. Although Cleo published an update and advisory for CVE-2024-50623—which allows unauthenticated remote code execution—Huntress security researchers have recreated the proof of concept and learned the patch does not mitigate the software flaw.
‍TL;DR - This vulnerability is being actively exploited in the wild and fully patched systems running 5.8.0.21 are still exploitable. We strongly recommend you move any internet-exposed Cleo systems behind a firewall until a new patch is released.2024-12-10T07:57:07.099373+00:00