• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Atlassian Confluence Hit by Newly Actively Exploited Zero-Day – Patch Now

You are here: Home / Cyber Security News / Atlassian Confluence Hit by Newly Actively Exploited Zero-Day – Patch Now

Atlassian has produced fixes to consist of an actively exploited critical zero-day flaw impacting publicly available Confluence Information Centre and Server situations.

The vulnerability, tracked as CVE-2023-22515, is remotely exploitable and will allow exterior attackers to develop unauthorized Confluence administrator accounts and accessibility Confluence servers.

It does not effect Confluence variations prior to 8… Confluence web sites accessed via an atlassian.net area are also not vulnerable to this issue.

The business software package products and services company mentioned it was designed knowledgeable of the issue by “a handful of clients.” It has been tackled in the next versions of Confluence Data Heart and Server –

  • 8.3.3 or afterwards
  • 8.4.3 or afterwards, and
  • 8.5.2 (Extensive Term Assist release) or later

The corporation, nevertheless, did not disclose any further particulars about the character and scale of the exploitation, or the root lead to of the vulnerability.

Shoppers who are unable to implement the updates are suggested to restrict exterior network obtain to the influenced situations.

“Furthermore, you can mitigate known attack vectors for this vulnerability by blocking accessibility to the /setup/* endpoints on Confluence instances,” Atlassian stated. “This is attainable at the network layer or by creating the next variations to Confluence configuration data files.”

The enterprise has also supplied the following indicators of compromise (IoCs) to ascertain if an on-premise occasion has been probably breached –

  • sudden customers of the confluence-administrator team
  • unexpected recently made user accounts
  • requests to /setup/*.motion in network access logs
  • presence of /set up/setupadministrator.motion in an exception information in atlassian-confluence-security.log in the Confluence residence directory

“If it is determined that your Confluence Server/DC instance has been compromised, our assistance is to right away shut down and disconnect the server from the network/Internet,” Atlassian reported.

“Also, you could want to immediately shut down any other devices which potentially share a user foundation or have typical username/password combinations with the compromised method.”

“It is really uncommon, though not unprecedented, for a privilege escalation vulnerability to have a critical severity ranking,” Immediate7’s Caitlin Condon claimed, introducing the flaw is “ordinarily more consistent with an authentication bypass or remote code execution chain than a privilege escalation issue by itself.”

With flaws in Atlassian Confluence circumstances broadly exploited by threat actors in the earlier, it can be suggested that shoppers update to a set edition right away, or put into action acceptable mitigations.

Discovered this posting appealing? Stick to us on Twitter  and LinkedIn to go through additional exceptional information we put up.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « Researchers Link DragonEgg Android Spyware to LightSpy iOS Surveillanceware
Next Post: Apple Rolls Out Security Patches for Actively Exploited iOS Zero-Day Flaw »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Samsung Patches CVE-2025-4632 Used to Deploy Mirai Botnet via MagicINFO 9 Exploit
  • BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan
  • Xinbi Telegram Market Tied to $8.4B in Crypto Crime, Romance Scams, North Korea Laundering
  • CTM360 Identifies Surge in Phishing Attacks Targeting Meta Business Users
  • Earth Ammit Breached Drone Supply Chains via ERP in VENOM, TIDRONE Campaigns

Copyright © 2025 · AllTech.News, All Rights Reserved.