Critical exploits and active malware campaigns ramp up cyber threats

December 27, 2024
Executive Summary
Trending / Critical Vulnerabilities
Exploit Activity and Mass Scanning Observed on Cytellite Sensors
Vulnerabilities abused by Botnet
Vulnerabilities Abused by Malware
PRE-NVD observed for this week
External References
Subscribe to our Reports

Executive Summary

This week, a critical vulnerability in Acclaim Systems' USAHERDS, involving hard-coded credentials, was added to the CISA KEV catalog. Proof-of-concept exploits have emerged for high-severity vulnerabilities in Microsoft Windows and Apache Tomcat. Adobe also released important updates for ColdFusion 2023 and 2021, addressing a flaw that could allow arbitrary file reading. These updates stress the importance of immediate patching to prevent exploitation.

Botnet activity is on the rise, with Zerobot targeting Tenda WiFi routers and Andoryu exploiting vulnerabilities in GitLab. IoT Reaper and AndroxGh0St continue attacking Cisco routers and PHP Unit, while veteran botnets like Mirai and Tsunami focus on an eight-year-old flaw in the Eir D1000 modem, underscoring the dangers of outdated infrastructure.

Additionally, Northwave discovered LITTLELAMB.WOOLTEA, a backdoor malware, during an active attack on a Palo Alto Networks firewall. Kaspersky also reported that the Cloud Atlas group uses sophisticated phishing campaigns to exploit Microsoft Office vulnerabilities in their cyber espionage efforts.

Trending / Critical Vulnerabilities

Current trending vulnerabilities offer insights into the latest emerging and widely discussed threats, helping to make informed decisions.  

CVE-2024-30085

A high-severity elevation of privilege vulnerability (CVSS 7.8) has been identified in the Windows Cloud Files Mini Filter Driver, specifically affecting Windows 11 23H2 installations. Proof-of-concept (PoC) code for the vulnerability is available, increasing the urgency for remediation. Microsoft has addressed this issue in the June 2024 Patch Tuesday updates, and users are strongly advised to apply the patch immediately to secure their systems against potential exploitation.

CVE-2024-53961

A high-severity path traversal vulnerability (CVSS 7.4) has been discovered in Adobe ColdFusion, impacting both the 2023 and 2021 versions. This vulnerability could allow attackers to access and read arbitrary files on compromised servers, posing a significant risk to sensitive data. Users of affected versions are strongly encouraged to implement appropriate security updates to mitigate potential exploitation.

CVE-2024-50379

A critical Time-of-Check Time-of-Use (TOCTOU) race condition vulnerability, rated 9.8 on CVSS scale, has been identified in Apache Tomcat during JSP compilation. This flaw could enable remote code execution (RCE) on case-insensitive file systems under specific conditions. Exploitation requires the default servlet to have write access enabled, which is not the default configuration. With a proof-of-concept (PoC) available, this vulnerability poses a serious risk, and administrators are urged to review configurations and apply the necessary patches without delay.

CVE-2024-56337

A critical remote code execution vulnerability has been identified in Apache Tomcat, a widely used open-source web server and servlet container for deploying Java-based applications. Assigned a CVSS score of 9.0, this flaw stems from an incomplete mitigation of CVE-2024-50379. The vulnerability primarily affects systems with case-insensitive file systems where the default servlet's write functionality is enabled. Apache addressed this issue with multiple patches being released, emphasizing the importance of applying updates to mitigate potential risks.

CVE-2024-9474

Palo Alto Networks PAN-OS software is impacted by an OS command injection vulnerability, which enables administrators with access to the management web interface to escalate privileges and perform root-level actions on the firewall. Rated with a CVSS score of 7.2 (High), this flaw highlights the need for immediate remediation and stringent access policies.

CVE-2021-44207

A high-severity vulnerability (CVSS Score 8.1) has been identified in Acclaim Systems' USAHERDS, stemming from the use of hard-coded credentials. This flaw could allow attackers to execute arbitrary code on vulnerable servers. The issue affects USAHERDS versions 7.4.0.1 and earlier, posing a significant risk to systems running these versions. Recognizing its critical nature, the vulnerability has been added to the CISA KEV catalog, emphasizing the need for immediate remediation.

Exploit Activity and Mass Scanning Observed on Cytellite Sensors

Telemetry collected from Loginsoft sensors were analyzed and processed to derive insights on what is actively being exploited and actively being scanned.  As source of truth, source IPv4 addresses & payloads can be provided on need-to-know basis.

Vulnerabilities Product Severity Title Exploited – in the wild CISA KEV
CVE-2024-47176 OpenPrinting CUPS Medium Improper Input Validation vulnerability in OpenPrinting CUPS browsed through 2.0.1 leads to remote code execution True False
CVE-2023-38646 Metabase open source/Enterprise Critical Remote code execution vulnerability in Metabase open source and Metabase Enterprise False False
CVE-2022-22947 Spring Cloud Gateway Critical Remote code execution vulnerability in Spring Cloud Gateway prior to 3.1.1+ and 3.0.7+ True True
CVE-2022-30075 TP-Link Router High Improper Validation vulnerability in TP-Link Router leads to remote code execution True False
CVE-2022-34045 Wavlink Devices Critical Hardcoded encryption/decryption key vulnerability in Wavlink True False
CVE-2021-41773 Apache HTTP Server High Path traversal vulnerability in Apache HTTP Server True True
CVE-2021-38647 Open Management Infrastructure Critical Remote Code Execution Vulnerability in Open Management Infrastructure True True
CVE-2021-26855 Microsoft Exchange Server Critical Remote Code Execution vulnerability in Microsoft Exchange Server True True
CVE-2021-27905 Apache Solr Critical Server-side request forgery (SSRF) vulnerability in the ReplicationHandler in Apache Solr True False
CVE-2021-22205 Gitlab-Exiftool Critical Remote code execution vulnerability in Gitlab-Exiftool True True

Vulnerabilities abused by Botnet

Identified vulnerabilities exploited by botnets, including recent CVEs logged in Misp. Presenting the top 5 CVEs with payloads suggestive of botnet activities, like utilizing wget with IP addresses.

Vulnerability Product Title Exploit Abused by Botnet
CVE-2022-30023 Tenda ONT GPON AC1200 Dual band WiFi HG9 v1.0.1 Command injection vulnerability via the Ping function in Tenda ONT GPON AC1200 Dual band WiFi HG9 v1.0.1 True Zerobot
CVE-2021-22205 Gitlab-Exiftool Remote code execution vulnerability in Gitlab-Exiftool True Andoryu
CVE-2017-9841 Util/PHP/eval-stdin.php in PHPUnit Arbitrary PHP code execution vulnerability in Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 True AndroxGh0st
CVE-2016-10372 Eir D1000 modem Improper protocol access control vulnerability in Eir D1000 modem True Bashlite
BrickerBot
Tsunami
Mirai
CVE-2013-2678 Cisco Linksys E4200 1.0.05 Build 7 routers Local file inclusion Vulnerability in Cisco Linksys E4200 1.0.05 Build 7 routers leads to obtain sensitive information or execute arbitrary code True IoTReaper

Vulnerabilities Abused by Malware

We proactively monitor the vulnerabilities which are targeted by adversaries. Each vulnerability is humanly studied and mapped with Mitre ATT&CK tactics and techniques. Source of information is derived from our vulnerability intelligence platform collected and curated information from various sources such as Twitter, Telegram, OSINT groups, Blogs, Data leak Sites and more.

CVE-2024-9474

During a forensic investigation, Northwave researchers uncovered an active attack targeting a Palo Alto Networks firewall. Detailed analysis of the compromised device revealed the presence of a novel, stealthy, and sophisticated backdoor, which has been linked to the LITTLELAMB.WOOLTEA malware.

CVE-2018-0802

Kaspersky reports that the Cloud Atlas cyber espionage group employs a sophisticated infection chain initiated through phishing emails containing malicious documents. These documents exploit a vulnerability in Microsoft Office's formula editor (CVE-2018-0802) to launch their attacks.

Vulnerability Severity Title Patch Targeted By Malware OSS
CVE-2024-9474 High OS command injection vulnerability in the Palo Alto Networks PAN-OS software. Yes LITTLELAMB.WOOLTEA False
CVE-2018-0802 High Memory corruption vulnerability in Microsoft Office Yes Cloud Atlas
VBShower backdoor
PowerShower
VBCloud
False

PRE-NVD observed for this week

It refers to vulnerabilities discovered and potentially exploited before their official inclusion in the National Vulnerability Database. The LOVI Platform aggregates and distributes data from open sources and social media, currently tracking over 100 security alerts and planning to expand.

CVE-ID Type of Vulnerability Product Reference
CVE-2024-11611 Memory Corruption AutomationDirect C-More EA9 Resource
CVE-2024-12547 Out-Of-Bounds Write Tungsten Automation Power PDF Resource
CVE-2024-12226 Sensitive Information Disclosure Kubernetes Worker Resource
CVE-2024-52050 Privilege Escalation Trend Micro Apex One and Apex One SaaS Resource
CVE-2023-7300 Path Traversal Huawei Home Music System Resource

External References

  1. https://www.cisa.gov/news-events/alerts/2024/12/23/cisa-adds-one-known-exploited-vulnerability-catalog
  2. https://securelist.com/cloud-atlas-attacks-with-new-backdoor-vbcloud/115103/  
  3. https://northwave-cybersecurity.com/hubfs/LITTLELAMB%20WOOLTEA%20technical%20writeup%20Schrijver%20and%20Oudenaarden.pdf  
  4. https://medium.com/@patelvidhi4288/deep-dive-poc-of-cve-2024-50379-exploit-tomcat-vulnerability-9-8-severity-776cfcfcf3ed  
  5. https://www.sangfor.com/farsight-labs-threat-intelligence/cybersecurity/cve-2024-50379-tomcat-remote-code-execution  
  6. https://securityonline.info/poc-exploit-released-for-cve-2024-30085-windows-elevation-of-privilege-vulnerability/

Get notified

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Latest Reports

Latest Reports