Critical, Actively Exploited Jenkins RCE Bug Suffers Patch Lag

Critical, Actively Exploited Jenkins RCE Bug Suffers Patch Lag

August 21, 2024 at 10:35AM

Jenkins, a widely used automation server, has been plagued by a critical CVE-2024-23897 vulnerability for seven months, with active exploitation ongoing. The vulnerability, if exploited, can lead to unauthorized file access, cryptographic key exposure, and code execution. Despite a security fix, many users failed to patch their systems, resulting in widespread and damaging attacks.

From the meeting notes, the main takeaways are as follows:

– Jenkins, a widely used open source automation server, has been found to have a critical vulnerability labeled CVE-2024-23897, which has been actively exploited for several months.
– The vulnerability allows unauthorized attackers to read arbitrary files on Jenkins’ controller file system, potentially enabling them to escalate privileges and gain code execution privileges.
– Despite the release of a security fix by the Jenkins development team, many developers did not implement the fix, resulting in numerous instances of the vulnerability being exposed globally.
– Evidence of exploitation of the vulnerability emerged within 24 hours after the disclosure, and there have been multiple instances of compromised systems and data breaches resulting from these exploits.
– The Cybersecurity and Infrastructure Security Agency (CISA) has added the flaw to its Known Exploited Vulnerabilities (KEV) catalog, giving Federal Civilian Executive Branch (FCEB) agencies a two-week window to remediate the issue.

It is clear from the notes that the CVE-2024-23897 vulnerability presents a significant security risk to organizations using Jenkins and that urgent action is needed to patch any vulnerable instances.

Full Article