US Cyber Command Warns of Ongoing 'Mass Exploitation' of Critical Confluence Vuln
Apply Atlassian's patch now — before the holiday weekend — the US Defense Department cybersecurity unit and CISA say.
On the heels of an advisory earlier this week from the Cybersecurity and Infrastructure Security Agency (CISA) and the FBI about the potential for widespread ransomware attacks over the upcoming Labor Day weekend, the US Cyber Command today warned of ongoing and spreading attacks in the wild exploiting a vulnerability in the Confluence workspace software platform.
"Mass exploitation of Atlassian Confluence CVE-2021-26084 is ongoing and expected to accelerate. Please patch immediately if you haven’t already — this cannot wait until after the weekend," the US Cyber Command posted on its Twitter feed today.
CISA also issued an alert today, urging organizations to install the patches immediately.
Atlassian on Aug. 25 issued an update for the remote code execution flaw, but attackers appear to be winning the race with organizations that have not yet applied the patch. The Object-Graph Navigation Language injection vulnerability could let an authenticated user and an unauthenticated user to run arbitrary code on a Confluence Server or Data Center instance, according to the company. Confluence Cloud is not affected by the flaw.
See Atlassian's alert here.
About the Author
You May Also Like
DevSecOps/AWS
Oct 17, 2024Social Engineering: New Tricks, New Threats, New Defenses
Oct 23, 202410 Emerging Vulnerabilities Every Enterprise Should Know
Oct 30, 2024Simplify Data Security with Automation
Oct 31, 2024Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024