PHP RCE Attack

Released: Jun 12, 2024

Updated: Jul 30, 2024


Critical Severity

PHP Vendor


Actively targeted by ransomware

FortiGuard Labs has observed significant level of exploitation attempts targeting the new PHP vulnerability. The TellYouThePass ransomware gang has been leveraging CVE-2024-4577, a remote code execution vulnerability in PHP to deliver web shells and deploy ransomware on targeted systems. Learn More »

Common Vulnerabilities and Exposures


Background

CVE-2024-4577 is an argument injection vulnerability in PHP, specifically Windows-based PHP used in CGI mode, that can be exploited to achieve remote code execution (RCE). This vulnerability is a bypass for the CVE-2012-1823, which is an older vulnerability affecting PHP. Censys has observed about 458,800 instances of potentially vulnerable PHP servers as of June 9, 2024.

TellYouThePass ransomware was previously associated with Log4Shell exploitation, targeting Windows and Linux, and has been active since 2019.

Latest Development

Recent news and incidents related to cybersecurity threats encompassing various events such as data breaches, cyber-attacks, security incidents, and vulnerabilities discovered.


Fortinet customers remain protected through the IPS signature to detect and block the attack attempts targeting the vulnerability. FortiGuard Labs recommends users apply the most recent patch from the vendor to fully mitigate any risks.

FortiGuard Cybersecurity Framework

Mitigate security threats and vulnerabilities by leveraging the range of FortiGuard Services.


PROTECT
  • Lure

  • Decoy VM

  • AV

  • Vulnerability

  • AV (Pre-filter)

  • Behavior Detection

  • IPS

  • Web App Security

  • Post-execution

DETECT
  • IOC

  • Outbreak Detection

  • Threat Hunting

  • Content Update

  • Playbook

RESPOND
  • Automated Response

  • Assisted Response Services

RECOVER
  • NOC/SOC Training

  • End-User Training

IDENTIFY
  • Vulnerability Management

  • Attack Surface Hardening

  • Business Reputation

  • Attack Surface Monitoring (Inside & Outside)

Threat Intelligence

Information gathered from analyzing ongoing cybersecurity events including threat actors, their tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), malware and related vulnerabilities.


References

Sources of information in support and relation to this Outbreak and vendor.