• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Hackers Exploiting Unpatched Critical Atlassian Confluence Zero-Day Vulnerability

You are here: Home / Cyber Security News / Hackers Exploiting Unpatched Critical Atlassian Confluence Zero-Day Vulnerability

Atlassian has warned of a critical unpatched remote code execution vulnerability impacting Confluence Server and Information Middle goods that it stated is being actively exploited in the wild.

The Australian program business credited cybersecurity firm Volexity for identifying the flaw, which is remaining tracked as CVE-2022-26134.

“Atlassian has been designed informed of present-day energetic exploitation of a critical severity unauthenticated distant code execution vulnerability in Confluence Facts Middle and Server,” it mentioned in an advisory.

“There are currently no set versions of Confluence Server and Facts Heart obtainable. Atlassian is operating with the highest precedence to issue a take care of.” Specifics of the security flaw have been withheld until eventually a software program patch is offered.

Confluence Server model 7.18. is known to have been exploited in the wild, though Confluence Server and Info Centre variations 7.4. and afterwards are potentially vulnerable.

In the absence of a deal with, Atlassian is urging shoppers to restrict Confluence Server and Information Heart circumstances from the internet or take into consideration disabling Confluence Server and Facts Center occasions altogether.

Volexity, in an unbiased disclosure, claimed it detected the action about the Memorial Day weekend in the U.S. as part of an incident reaction investigation.

The attack chain associated leveraging the Atlassian zero-day exploit — a command injection vulnerability — to reach unauthenticated remote code execution on the server, enabling the risk actor to use the foothold to fall the Behinder web shell.

“Behinder delivers incredibly highly effective abilities to attackers, which include memory-only webshells and constructed-in help for interaction with Meterpreter and Cobalt Strike,” the scientists stated. “At the exact time, it does not allow for persistence, which signifies a reboot or service restart will wipe it out.”

Subsequently, the web shell is claimed to have been utilized as a conduit to deploy two added web shells to disk, such as China Chopper and a custom file add shell to exfiltrate arbitrary data files to a remote server.

The growth arrives fewer than a yr just after an additional critical remote code execution flaw in Atlassian Confluence (CVE-2021-26084, CVSS rating: 9.8) was actively weaponized in the wild to install cryptocurrency miners on compromised servers.

“By exploiting this sort of vulnerability, attackers can achieve direct access to hugely sensitive methods and networks,” Volexity claimed. “Even further, these programs can typically be complicated to examine, as they absence the suitable checking or logging capabilities.”

Located this short article attention-grabbing? Comply with THN on Fb, Twitter  and LinkedIn to read through much more special articles we publish.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « BMW’s new entry-level EV is the iX1 SUV
Next Post: Ford CEO wants EV sales to be ‘100%’ online »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk
  • ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks
  • Over 80,000 Microsoft Entra ID Accounts Targeted Using Open-Source TeamFiltration Tool

Copyright © 2025 · AllTech.News, All Rights Reserved.