{"id":28756,"date":"2024-12-17T15:30:44","date_gmt":"2024-12-17T15:30:44","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=28756"},"modified":"2024-12-17T19:18:53","modified_gmt":"2024-12-17T19:18:53","slug":"cleo-file-transfer-vulnerabilities-exploited","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/cleo-file-transfer-vulnerabilities-exploited\/","title":{"rendered":"Cleo File Transfer Vulnerabilities Exploited by Cl0p Ransomware"},"content":{"rendered":"<p>Recent cybersecurity incidents have exposed <strong>critical vulnerabilities in Cleo&#8217;s file transfer software<\/strong> \u2013 Cleo Harmony, VLTrader, and LexiCom \u2013 which are actively being exploited.<br \/>\nThese flaws, specifically CVE-2024-50623 and CVE-2024-55956, enable attackers to perform remote code execution (RCE). This can result in unauthorized access, data theft, and even ransomware deployment.<\/p>\n<h2>Cleo File Transfer Vulnerabilities Are A New Ransomware Attack Vector<\/h2>\n<p>In October 2024, Cleo released version 5.8.0.21 to patch <a href=\"https:\/\/gridinsoft.com\/zeroday\">a severe zero-day vulnerability<\/a> (CVE-2024-50623). This flaw allowed unrestricted file uploads and downloads, enabling attackers <strong>to inject and execute malicious files remotely<\/strong>. However, security firm Huntress later revealed that the patch was incomplete, leaving systems vulnerable to attacks from other vectors. Exploitation began as early as December 3, 2024, with attackers uploading Java-based backdoors to compromised systems.<\/p>\n<p>On December 13, CISA (Cybersecurity and Infrastructure Security Agency) <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2024\/12\/13\/cisa-adds-one-known-exploited-vulnerability-catalog\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">confirmed active exploitation<\/a> of the vulnerability, adding it to their Known Exploited Vulnerabilities (KEV) catalog. These attacks are suspected to involve Termite ransomware and the notorious Cl0p ransomware group.<\/p>\n<h2>CVE-2024-50623 And CVE-2024-55956 Flaws Explained<\/h2>\n<p>CVE-2024-50623 is a critical zero-day vulnerability in Cleo&#8217;s software. It has <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-50623\" rel=\"nofollow noopener\" target=\"_blank\">a CVSS score of 8.8<\/a> and enables Remote Code Execution (RCE). The issue stems from <strong>improper handling of file uploads in the Autorun directory<\/strong>. Attackers exploit this vulnerability to run unauthorized bash or PowerShell commands.<\/p>\n<figure id=\"attachment_28773\" aria-describedby=\"caption-attachment-28773\" style=\"width: 1694px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/12\/CVE-2024-50623-1.webp\" alt=\"Cleo Unrestricted file upload and download PoC screenshot\" width=\"1694\" height=\"1062\" class=\"size-full wp-image-28773\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/12\/CVE-2024-50623-1.webp 1694w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/12\/CVE-2024-50623-1-300x188.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/12\/CVE-2024-50623-1-1024x642.webp 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/12\/CVE-2024-50623-1-768x481.webp 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/12\/CVE-2024-50623-1-1536x963.webp 1536w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/12\/CVE-2024-50623-1-860x539.webp 860w\" sizes=\"auto, (max-width: 1694px) 100vw, 1694px\" \/><figcaption id=\"caption-attachment-28773\" class=\"wp-caption-text\">Cleo Unrestricted file upload and download PoC<\/figcaption><\/figure>\n<p>By sending specially crafted requests, attackers can retrieve files from a server or upload malicious files, leading to code execution. Researchers have observed threat actors using this vulnerability to deploy reverse shells. As a result, this gives them persistent access and control over compromised systems. Approximately 1,342 instances of Cleo software were found exposed online, with 79% located in the United States.<\/p>\n<p>CVE-2024-55956, discovered on December 10, is a more severe vulnerability in Cleo\u2019s software <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-55956\" target=\"_blank\" rel=\"nofollow noopener\">with a CVSS score of 9.8<\/a>. Like the previous flaw, it allows for RCE through the Autorun directory. This also enables attackers to deploy modular Java backdoors, steal sensitive data, and move laterally within networks. The vulnerability bypasses the earlier patch for CVE-2024-50623, leaving systems exposed even after updates.<\/p>\n<h2>Who\u2019s Behind the Attacks?<\/h2>\n<p>What about the threat actor, initial suspicions pointed to Termite, particularly after their attacks on Blue Yonder. However, the real culprit was confirmed to be Cl0p. The group, infamous for targeting MFT software (like last year\u2019s <a href=\"https:\/\/gridinsoft.com\/blogs\/hacker-leaks-corporate-data-moveit-hacks\/\">MOVEit Transfer breaches<\/a>), announced on their leak site that they exploited the Cleo vulnerabilities for data theft operations.<\/p>\n<figure id=\"attachment_28763\" aria-describedby=\"caption-attachment-28763\" style=\"width: 1674px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/12\/clop-cleo.png.webp\" alt=\"CL0P\u2019s message screenshot\" width=\"1674\" height=\"482\" class=\"size-full wp-image-28763\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/12\/clop-cleo.png.webp 1674w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/12\/clop-cleo.png-300x86.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/12\/clop-cleo.png-1024x295.webp 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/12\/clop-cleo.png-768x221.webp 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/12\/clop-cleo.png-1536x442.webp 1536w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/12\/clop-cleo.png-860x248.webp 860w\" sizes=\"auto, (max-width: 1674px) 100vw, 1674px\" \/><figcaption id=\"caption-attachment-28763\" class=\"wp-caption-text\">CL0P\u2019s message regarding Cleo attacks (source: SOCRadar)<\/figcaption><\/figure>\n<p>Cl0p hackers also claimed to focus only on new victims, deleting data from previous breaches. At least <strong>50 Cleo hosts and 10 businesses<\/strong> have been compromised so far, with many more at risk. During these attacks, researchers also identified a Java-based malware called Malichus.<\/p>\n<div class=\"box\">The latest breach involving Cl0p ransomware gang leaked huge amount of <a href=\"https:\/\/gridinsoft.com\/blogs\/american-airlines-hack-cl0p\/\">data from American Airlines<\/a>, consider checking our news article about it.<\/div>\n<p>This malware enables command execution on compromised systems, facilitates data transfers for theft, and supports network communication for lateral movement. Malichus is cross-platform, capable of affecting both Windows and Linux systems, making it highly adaptable for attackers. Reports show that <strong>around 1,700 servers<\/strong> were targeted. The retail, food, trucking, and shipping industries were the most impacted, particularly in North America.<\/p>\n<h2>Cleo Recommendations for the Customers<\/h2>\n<p>Organizations using Cleo software need to act immediately to address these vulnerabilities. The first step is <strong>to update all systems to version 5.8.0.24<\/strong>, as this patch resolves both CVE-2024-50623 and CVE-2024-55956.<\/p>\n<p>Disabling the Autorun directory temporarily can prevent attackers from executing unauthorized commands. To further secure their environment, organizations should remove Cleo servers from public internet exposure, protect them with firewalls, and restrict external access.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recent cybersecurity incidents have exposed critical vulnerabilities in Cleo&#8217;s file transfer software \u2013 Cleo Harmony, VLTrader, and LexiCom \u2013 which are actively being exploited. These flaws, specifically CVE-2024-50623 and CVE-2024-55956, enable attackers to perform remote code execution (RCE). This can result in unauthorized access, data theft, and even ransomware deployment. Cleo File Transfer Vulnerabilities Are [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":28765,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[379,619,55,374],"class_list":{"0":"post-28756","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-clop","9":"tag-cybersecurity","10":"tag-ransomware","11":"tag-vulnerability"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/12\/Cleo-File-Transfer-Vulnerabilities.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/28756","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=28756"}],"version-history":[{"count":14,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/28756\/revisions"}],"predecessor-version":[{"id":28774,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/28756\/revisions\/28774"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/28765"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=28756"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=28756"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=28756"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}