top of page

Major Cybersecurity Flaws Under Attack: A Call to Action for Software Users

Writer's picture: John JordanJohn Jordan

Recent reports have highlighted critical cybersecurity vulnerabilities being actively exploited across various software platforms, including BeyondTrust, Cleo, and Fortinet. These flaws pose significant risks to organizations, necessitating immediate action to mitigate potential breaches and protect sensitive data.

BeyondTrust | BetterWorld Technology

Key Takeaways

  • Active Exploitation: Critical vulnerabilities in BeyondTrust, Cleo, and Fortinet software are currently being exploited by cybercriminals.

  • Urgent Patches Required: Users are urged to apply patches and updates to safeguard their systems.

  • Widespread Impact: The vulnerabilities affect a range of industries, increasing the urgency for organizations to act.

BeyondTrust Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical command injection vulnerability in BeyondTrust's Privileged Remote Access (PRA) and Remote Support (RS) products to its Known Exploited Vulnerabilities catalog. This flaw, tracked as CVE-2024-12356, has a CVSS score of 9.8, indicating its severity.

  • Impact: Attackers can execute arbitrary commands as site users, potentially leading to unauthorized access and data breaches.

  • Affected Versions: Users of PRA and RS versions 24.3.1 and earlier must apply the latest patches (BT24-10-ONPREM1 or BT24-10-ONPREM2).

BeyondTrust has confirmed that the vulnerability was discovered during an investigation into a recent cyber incident affecting some of its Remote Support SaaS customers. The company is working with cybersecurity experts to assess the full impact of the breach.

Cleo File Transfer Software Under Siege

Cleo has reported a critical zero-day vulnerability in its file-transfer software, which is currently under mass exploitation. This vulnerability, initially disclosed in October, allows for unrestricted file uploads and downloads, leading to potential remote code execution.

  • Current Situation: Despite a previous patch, researchers have noted that the flaw is still being exploited in both unpatched and patched versions of the software.

  • New CVE and Patch: Cleo is preparing to release a new CVE designation and patch to address the ongoing exploitation.

The vulnerability has already impacted multiple companies, particularly in the consumer products and shipping industries, highlighting the need for immediate action from affected organizations.

Fortinet's FortiClient EMS Vulnerability

Cybersecurity researchers have identified active exploitation of a critical vulnerability in Fortinet’s FortiClient Enterprise Management Server (EMS), tracked as CVE-2023-48788. This flaw allows attackers to execute unauthorized SQL commands, leading to potential remote code execution.

  • Affected Versions: The vulnerability impacts FortiClient EMS versions 7.0.1 to 7.0.10 and 7.2.0 to 7.2.2, with a CVSS score of 9.8.

  • Exploitation Risks: Attackers can infiltrate enterprise networks, conduct reconnaissance, and deploy malicious payloads.

Organizations using FortiClient EMS are urged to update to patched versions (7.0.11 or later, 7.2.3 or later) and implement additional security measures, such as restricting internet exposure and monitoring network traffic.

The recent exploitation of critical vulnerabilities in widely used software underscores the urgent need for organizations to prioritize cybersecurity. Immediate action, including applying patches and enhancing security protocols, is essential to protect sensitive data and maintain operational integrity. Cybersecurity is a shared responsibility, and organizations must remain vigilant against evolving threats in the digital landscape.

Staying informed about the ever-evolving cybersecurity landscape is more critical than ever. Threats like ransomware and data breaches require proactive measures and reliable partners. At BetterWorld Technology, we specialize in providing robust IT solutions to safeguard your business against cyber risks. Let us help you strengthen your security posture and achieve peace of mind. Contact us today to learn more about our tailored cybersecurity services.

Sources

  • CISA Adds Critical Flaw in BeyondTrust Software to Exploited Vulnerabilities List, The Hacker News.

  • Critical flaw in Cleo file-transfer software is under mass exploitation, Cybersecurity Dive.

  • Hackers Exploiting FortiClient EMS Vulnerability (CVE-2023-48788) in the Wild, Cyber Security News.

  • BeyondTrust Issues Urgent Patch for Critical Vulnerability in PRA and RS Products, The Hacker News.

15 views
bottom of page