Security Vulnerabilities fixed in Kaseya Server 9.5.7.2994

description-logoDescription

Credential disclosure, XSS, and 2FA bypass in Kaseya VSA before 9.5.7 allow attackers to harvest Agent_Guid/AgentPassword from KaseyaD.ini, obtain sessionId via dl.asp GET, inject scripts via rcResults.asp/done.asp, and disable MFA by altering client-side flags.

description-logoOutbreak Alert

A recent high profile exploit involing Kaseya VSA product was linked to the REvil ransomware. This report summarizes the Fortinet Security Fabric coverage for the REvil ransomware itself. Refer to the separate report for more detail about the Kaseya vulnerability.

View the full Outbreak Alert Report

This report focusses on the Kaseya vulnerability itself -- A separate (dedicated) report is available for the REvil ransomware which exploits this vunlerability. Kaseya VSA product is the victim of a sophisticated cyberattack causing many of its customers to be infected with ransomware. On July 2, the SaaS version was temporarily shutdown, and Kaseya warned all its customers to immediately stop using the on-premise version until a patch is available. Nearly 40 of its MSP customers were reported hacked, who themselves manage hundreds or thousands of businesses underneath. https://www.nbcnews.com/tech/security/ransomware-attack-software-manager-hits-200-companies-rcna1338 Background

View the full Outbreak Alert Report

affected-products-logoAffected Applications

Kaseya Server

Version Updates

Date Version Status Detail
2021-12-29 1.00284
Modified
Kaseya Server
2021-07-12 1.00252
New
Kaseya Server
2021-07-07 1.00250
New
Kaseya Server