US Cyber Command Warns of Ongoing 'Mass Exploitation' of Critical Confluence Vuln

Apply Atlassian's patch now — before the holiday weekend — the US Defense Department cybersecurity unit and CISA say.

Dark Reading Staff, Dark Reading

September 3, 2021

1 Min Read
US Cyber Command head Paul Nakasone
Gen. Paul Nakasone, Commander of US Cyber Commandvia US Cyber Command

On the heels of an advisory earlier this week from the Cybersecurity and Infrastructure Security Agency (CISA) and the FBI about the potential for widespread ransomware attacks over the upcoming Labor Day weekend, the US Cyber Command today warned of ongoing and spreading attacks in the wild exploiting a vulnerability in the Confluence workspace software platform.

"Mass exploitation of Atlassian Confluence CVE-2021-26084 is ongoing and expected to accelerate. Please patch immediately if you haven’t already — this cannot wait until after the weekend," the US Cyber Command posted on its Twitter feed today.

CISA also issued an alert today, urging organizations to install the patches immediately.

Atlassian on Aug. 25 issued an update for the remote code execution flaw, but attackers appear to be winning the race with organizations that have not yet applied the patch. The Object-Graph Navigation Language injection vulnerability could let an authenticated user and an unauthenticated user to run arbitrary code on a Confluence Server or Data Center instance, according to the company. Confluence Cloud is not affected by the flaw.

See Atlassian's alert here.

About the Author(s)

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights