Critical Flaw – JetBrains Urges Immediate Patching of TeamCity Servers

by | Feb 7, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

JetBrains has issued an urgent call to action for customers to swiftly patch their TeamCity On-Premises servers in response to a critical authentication bypass vulnerability, identified as CVE-2024-23917. This severe flaw, affecting all versions of TeamCity On-Premises from 2017.1 through 2023.11.2, poses a grave risk of enabling attackers to seize control of vulnerable instances with admin privileges.

JetBrains emphasized the importance of updating servers to version 2023.11.3 to address the vulnerability promptly. For users unable to immediately upgrade, a security patch plugin is available to secure servers running TeamCity 2018.2+ and versions 2017.1, 2017.2, and 2018.1.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Acknowledging the urgency of the situation, JetBrains advised temporarily restricting public access to servers if immediate mitigation is not feasible. While JetBrains confirmed that all TeamCity Cloud servers have been patched, it remains undisclosed whether CVE-2024-23917 has been exploited in the wild to compromise Internet-exposed TeamCity On-Premises servers.

Shadowserver’s monitoring has identified over 2,000 exposed TeamCity servers online, heightening the urgency for mitigation efforts. This vulnerability bears resemblance to a prior exploit, CVE-2023-42793, which was leveraged by the APT29 hacking group and various ransomware gangs in widespread attacks.

TeamCity servers explosed onlineTeamCity servers exposed online (Shadowserver)




Additionally, Microsoft reported that North Korean hacking groups Lazarus and Andariel also exploited CVE-2023-42793, highlighting the severity of the threat. With more than 30,000 organizations worldwide relying on the TeamCity software building and testing platform, including notable names like Citibank, Ubisoft, HP, Nike, and Ferrari, the urgency of addressing this vulnerability cannot be overstated.

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This