US Cyber Command Warns of Ongoing 'Mass Exploitation' of Critical Confluence Vuln
Apply Atlassian's patch now — before the holiday weekend — the US Defense Department cybersecurity unit and CISA say.
On the heels of an advisory earlier this week from the Cybersecurity and Infrastructure Security Agency (CISA) and the FBI about the potential for widespread ransomware attacks over the upcoming Labor Day weekend, the US Cyber Command today warned of ongoing and spreading attacks in the wild exploiting a vulnerability in the Confluence workspace software platform.
"Mass exploitation of Atlassian Confluence CVE-2021-26084 is ongoing and expected to accelerate. Please patch immediately if you haven’t already — this cannot wait until after the weekend," the US Cyber Command posted on its Twitter feed today.
CISA also issued an alert today, urging organizations to install the patches immediately.
Atlassian on Aug. 25 issued an update for the remote code execution flaw, but attackers appear to be winning the race with organizations that have not yet applied the patch. The Object-Graph Navigation Language injection vulnerability could let an authenticated user and an unauthenticated user to run arbitrary code on a Confluence Server or Data Center instance, according to the company. Confluence Cloud is not affected by the flaw.
See Atlassian's alert here.
About the Author(s)
You May Also Like
Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
May 16, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024