CISA is warning {that a} vital Citrix ShareFile safe file switch vulnerability tracked as CVE-2023-24489 is being focused by unknown actors and has added the flaw to its catalog of identified safety flaws exploited within the wild.
Citrix ShareFile (also referred to as Citrix Content material Collaboration) is a managed file switch SaaS cloud storage resolution that enables prospects and workers to add and obtain information securely.
The service additionally provides a ‘Storage zones controller’ resolution that enables enterprise prospects to configure their non-public knowledge storage to host information, whether or not on-premise or at supported cloud platforms, equivalent to Amazon S3 and Home windows Azure.
On June thirteenth, 2023, Citrix launched a safety advisory on a brand new ShareFile storage zones vulnerability tracked as CVE-2023-24489 with a vital severity rating of 9.8/10, which might enable unauthenticated attackers to compromise customer-managed storage zones.
“A vulnerability has been found within the customer-managed ShareFile storage zones controller which, if exploited, might enable an unauthenticated attacker to remotely compromise the customer-managed ShareFile storage zones controller,” Citrix explains.
Cybersecurity agency AssetNote disclosed the vulnerability to Citrix, warning in a technical writeup that the flaw is attributable to a couple of small errors in ShareFile’s implementation of AES encryption.
“Via our analysis we had been in a position to obtain unauthenticated arbitrary file add and full distant code execution by exploiting a seemingly innocuous cryptographic bug,” AssetNote researchers clarify.
Utilizing this flaw, a risk actor might add an internet shell to a tool to achieve full entry to the storage and all its information.
CISA warns that risk actors generally exploit these kind of flaws and pose a major threat to federal enterprises.
Whereas CISA shares this similar warning on many advisories, flaws impacting managed file switch (MFT) options are of specific concern, as risk actors have closely exploited them to steal knowledge from corporations in extortion assaults.
One ransomware operation, referred to as Clop, has taken a specific curiosity in focusing on these kind of flaws, utilizing them in widescale knowledge theft assaults since 2021, once they exploited a zero-day flaw within the Accellion FTA resolution.
Since then, Clop has carried out quite a few data-theft campaigns utilizing zero-day flaws in SolarWinds Serv-U, GoAnywhere MFT, and, most not too long ago, the huge assaults on MOVEit Switch servers.
Energetic exploitation
As a part of AssetNote’s technical writeup, the researchers shared sufficient info for risk actors to develop exploits for the Citrix ShareFile CVE-2023-24489 flaw. Quickly after, different researchers launched their very own exploits on GitHub.
On July twenty sixth, GreyNoise started monitoring for makes an attempt to take advantage of the vulnerability. After CISA warned in regards to the flaw immediately, GreyNoise up to date its report back to say there had been a major uptick in makes an attempt by totally different IP addresses.
“GreyNoise noticed a major spike in attacker exercise the day CISA added CVE-2023-24489 to their Identified Exploited Vulnerabilities Catalog,” warns GreyNoise.
Right now, GreyNoise has seen makes an attempt to take advantage of or verify if a ShareFile server is susceptible from 72 IP addresses, with the bulk from South Korea and others in Finland, the UK, and the US.

Supply: GreyNoise
Whereas no publicly identified exploitation or knowledge theft has been linked to this flaw, CISA now requires Federal Civilian Govt Department (FCEB) businesses to use patches for this bug by September sixth, 2023.
Nonetheless, because of the extremely focused nature of those bugs, it could be strongly suggested that every one organizations apply the updates as quickly as potential.