Jenkins RCE Attack
Actively exploited in Ransomware campaigns
https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3314
Cyber threat actors target Jenkins Arbitrary File Read vulnerability (CVE-2024-23897) in ransomware attacks. FortiGuard Labs continues to see active attack telemetry targeting the vulnerability.
Background
Jenkins is an open-source continuous integration (CI) server, and a popular DevOps tool used by thousands of development teams. It manages and controls several stages of the software delivery process, including building, automated testing, packaging, and more. Jenkins has a built-in Command-Line Interface (CLI) that uses the args4j library to parse command arguments and options on the Jenkins controller during CLI command processing. The vulnerability (CVE-2024-23897) in this library allows unauthenticated users to read the initial lines of any file on the file system, which further leads to RCE. Additionally, FortiRecon ACI service has observed recent discussions related to CVE-2024-23897 on the Dark Web. Also, a Proof of Concept (PoC) exploit has been made publicly available which makes this vulnerability crucial for patching and detecting any exploitation activity.
Latest Developments

Fortinet customers remain protected through the IPS service and has blocked all the known hashes and Indicators of Compromise (IoCs) in the related campagins. FortiGuard Labs advises organizations to apply the latest Jenkins security updates and patches to fully mitigate any risks.

arrow_icon
PROTECT

Countermeasures across the security fabric for protecting assets, data and network from cybersecurity events:

AV

Detects known malware related to the Outbreak

DB 92.06712
DB 92.06712
DB 92.06712
DB 92.06712
DB 92.06712
DB 92.06712
DB 92.06712
DB 92.06712
DB 92.06712
Vulnerability

Detects end-user devices running the vulnerable application.

IPS

Detects and blocks attack attempts leveraging the vulnerability

DB 27.750
DB 27.750
DB 27.750
DB 27.750
DB 27.750
Web App Security

Detects and blocks attack attempts leveraging the vulnerability

arrow_icon
DETECT

Find and correlate important information to identify an outbreak, the following updates are available to raise alert and generate reports:

arrow_icon
RESPOND

Develop containment techniques to mitigate impacts of security events:

Automated Response

Services that can automaticlly respond to this outbreak.

Assisted Response Services

Experts to assist you with analysis, containment and response activities.

arrow_icon
RECOVER

Improve security posture and processes by implementing security awareness and training, in preparation for (and recovery from) security incidents:

NOC/SOC Training

Train your network and security professionals and optimize your incident response to stay on top of the cyberattacks.

End-User Training

Raise security awareness to your employees that are continuously being targeted by phishing, drive-by download and other forms of cyberattacks.

arrow_icon
IDENTIFY

Identify processes and assets that need protection:

Attack Surface Hardening

Check Security Fabric devices to build actionable configuration recommendations and key indicators.

Attack Surface Monitoring (Inside & Outside)

Security reconnaissance and penetration testing services, covering both internal & external attack vectors, including those introduced internally via software supply chain.

Vulnerability Management

Reduce the attack surface on software vulnerabilities via systematic and automated patching.