Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Researchers find a way to close Cryptominer companies using bad stocks and Xmrogue

June 24, 2025

APT28 uses signal chat to expand malicious Beardhell ​​and Testament software in Ukraine

June 24, 2025

Talk CTEM we all need

June 24, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » CISA Warns of Critical Jenkins Vulnerability Exploited in Ransomware Attacks
Global Security

CISA Warns of Critical Jenkins Vulnerability Exploited in Ransomware Attacks

AdminBy AdminAugust 20, 2024No Comments2 Mins Read
Jenkins Vulnerability Ransomware Attacks
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


August 20, 2024Ravi LakshmananVulnerability / Ransomware

Ransomware Attacks Jenkins Vulnerability

The US Cybersecurity and Infrastructure Security Agency (CISA) has added critical security flaw that affects known Jenkins exploited vulnerabilities (KEV) directory after its use in ransomware attacks.

Vulnerability, tracked as CVE-2024-23897 (CVSS score: 9.8), is a path traversal flaw that can lead to code execution.

“The Jenkins Command Line Interface (CLI) contains a path traversal vulnerability that could allow an attacker to restrict read access to certain files, which could lead to code execution,” CISA said in a statement.

Cyber ​​security

It was the first opened By Sonar security researchers in January 2024 and addressed in Jenkins 2.442 and LTS 2.426.3 by disabling the Command Analyzer feature.

Back in March, Trend Micro said it found several attack cases from the Netherlands, Singapore, and Germany, and that it found cases where remote code execution exploits for the flaw are being actively traded.

Ransomware Attacks Jenkins Vulnerability

In recent weeks, CloudSEK and Juniper Networks discovered a series of cyberattacks using CVE-2024-23897 in the wild to infiltrate BORN Group and Brontoo Technology Solutions.

The attacks were attributed to a threat known as IntelBroker and RansomExx gang of extortionists, respectively.

Cyber ​​security

“CVE-2024-23897 is an unauthenticated LFI vulnerability that allows attackers to read arbitrary files on a Jenkins server” – CloudSEK said. “This vulnerability occurs due to incorrect input validation, which allows an attacker to manipulate certain parameters and trick the server into accessing and displaying the contents of sensitive files.”

Ransomware Attacks Jenkins Vulnerability

Due to the active exploitation of the vulnerability, Federal Civil Enforcement Agency (FCEB) agencies have until September 9, 2024 to apply fixes and protect their networks from active threats.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Researchers find a way to close Cryptominer companies using bad stocks and Xmrogue

June 24, 2025

APT28 uses signal chat to expand malicious Beardhell ​​and Testament software in Ukraine

June 24, 2025

Talk CTEM we all need

June 24, 2025

Hackers operate incorrectly configured API Docker to hand over cryptocurrency via Tor Network

June 24, 2025

US House forbids WhatsApp on official security and protection devices

June 24, 2025

Salt Typhoon associated with China

June 24, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Researchers find a way to close Cryptominer companies using bad stocks and Xmrogue

June 24, 2025

APT28 uses signal chat to expand malicious Beardhell ​​and Testament software in Ukraine

June 24, 2025

Talk CTEM we all need

June 24, 2025

Hackers operate incorrectly configured API Docker to hand over cryptocurrency via Tor Network

June 24, 2025

US House forbids WhatsApp on official security and protection devices

June 24, 2025

Salt Typhoon associated with China

June 24, 2025

DHS warns pro -Irkers who can target US networks after Iran’s nuclear strikes

June 23, 2025

Echo Chamber Jailbreak Tricks LLM as Openai and Google, To create harmful content

June 23, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Researchers find a way to close Cryptominer companies using bad stocks and Xmrogue

June 24, 2025

APT28 uses signal chat to expand malicious Beardhell ​​and Testament software in Ukraine

June 24, 2025

Talk CTEM we all need

June 24, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.