Cleo File Transfer Vulnerability Exploited in Wild

17 views 2 minutes read

A Cleo file transfer vulnerability is causing serious concern as attackers exploit it in the wild, targeting businesses across various industries. Tracked as CVE-2024-50623, this improperly patched flaw affects Cleo’s popular file transfer tools, including Harmony, VLTrader, and LexiCom.

Despite an earlier attempt to fix the issue, attackers have bypassed the patch, leading to widespread exploitation.

Key Takeaway to Cleo File Transfer Vulnerability:

Businesses using Cleo file transfer tools must update their systems immediately to avoid falling victim to ongoing attacks.


The Cleo File Transfer Vulnerability: An Overview

Cleo, an Illinois-based company providing supply chain and B2B integration solutions, supports over 4,200 organizations globally.

In late October, the company released version 5.8.0.21 to fix a critical unrestricted file upload/download vulnerability that could enable remote code execution.

However, cybersecurity firm Huntress discovered that this patch failed to address the issue, leaving systems exposed to active exploitation.

Details of CVE-2024-50623

AttributeDetails
CVE IdentifierCVE-2024-50623
Affected ProductsCleo Harmony, VLTrader, LexiCom
RiskUnrestricted file uploads leading to remote code execution
StatusExploited in the wild, patch incomplete

Exploitation in the Wild

Attackers have been targeting vulnerable Cleo servers since December 3, with a spike in incidents noted on December 8. So far, at least 10 businesses have been compromised, with attack attempts observed on nearly 1,700 servers.

Huntress reported that attackers use these vulnerabilities to:

  • Establish persistence on compromised systems.
  • Conduct reconnaissance to understand the network.
  • Execute stealthy post-exploitation activities.

Industries Affected

According to Huntress, businesses in the following sectors are the most impacted:

IndustryExamples of Impacted Businesses
Consumer ProductsRetailers and distributors
Food IndustryFood production and supply chain companies
TruckingLogistics and transport service providers
ShippingFreight and cargo handling enterprises

Lessons from the MOVEit Hack

This situation is reminiscent of the MOVEit hack campaign, where cybercriminals exploited a zero-day vulnerability in Progress Software’s file transfer tool to steal sensitive data from thousands of organizations.

That attack serves as a cautionary tale about the dangers of unpatched vulnerabilities in file transfer systems.

Shodan Insights: Exposed Systems

A Shodan search reveals hundreds of internet-exposed Cleo product instances still running vulnerable versions. This underscores the urgent need for organizations to secure their systems by applying Cleo’s forthcoming patch.

Huntress and Rapid7 Sound the Alarm

Both Huntress and Rapid7 have confirmed active exploitation of the Cleo file transfer vulnerability. Rapid7 observed similar enumeration and post-exploitation activity across multiple incidents and is actively investigating.

Recommendations from Huntress

Huntress shared Indicators of Compromise (IoCs) to help defenders detect and block attacks. While Cleo has updated its advisory with mitigation recommendations, the document is restricted to logged-in users on the Cleo website.

Rounding Up

The Cleo file transfer vulnerability highlights the critical need for robust software patching and timely updates. Businesses relying on Cleo’s tools must prioritize securing their systems to prevent unauthorized access and potential data breaches. With attacks escalating, cybersecurity diligence is more important than ever.

Organizations should monitor Cleo’s website for the latest patches and stay informed about evolving threats to protect their operations.

About Cleo

Cleo is a global leader in cloud-based integration solutions, specializing in supply chain management and B2B data exchange. Its flagship products, including Harmony, VLTrader, and LexiCom, are widely used for secure file transfers in enterprise environments.


FAQs

What is the Cleo file transfer vulnerability?

It’s a critical flaw in Cleo’s Harmony, VLTrader, and LexiCom tools, allowing attackers to upload or download files without restrictions, leading to potential remote code execution.

How is CVE-2024-50623 being exploited?

Attackers are using it to establish persistence, conduct reconnaissance, and execute other post-exploitation activities.

What industries are most affected?

Industries dealing with consumer products, food, trucking, and shipping have been heavily impacted.

How can businesses protect themselves?

Update Cleo products to the latest version as soon as the new patch is released. Monitor systems for suspicious activity using Huntress-provided IoCs.

Has this vulnerability been patched?

A patch was released in October but failed to address the issue. Cleo is working on a new fix expected this week.

Are similar vulnerabilities common?

Yes, the MOVEit hack campaign is a notable example of a similar vulnerability that led to massive data theft.

Where can I find the latest updates?

Visit Cleo’s official advisory page for updates and recommendations.

Leave a Comment

About Us

CyberSecurityCue provides valuable insights, guidance, and updates to individuals, professionals, and businesses interested in the ever-evolving field of cybersecurity. Let us be your trusted source for all cybersecurity-related information.

Editors' Picks

Trending News

©2010 – 2023 – All Right Reserved | Designed & Powered by HostAdvocate

CyberSecurityCue (Cyber Security Cue) Logo
Subscribe To Our Newsletter

Subscribe To Our Newsletter

Join our mailing list for the latest news and updates.

You have Successfully Subscribed!

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More