Table of Contents
  • Home
  • /
  • Blog
  • /
  • CISA Warns of Active Exploitation: What You Need to Know About CVE-2024-51567 in CyberPanel
November 9, 2024
|
3m

CISA Warns of Active Exploitation: What You Need to Know About CVE-2024-51567 in CyberPanel


Critical CVE-2024-51567 Hits CyberPanel

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a stark warning regarding the critical vulnerability CVE-2024-51567, which affects CyberPanel, a widely used web hosting control panel. This vulnerability allows remote, unauthenticated attackers to execute arbitrary commands on affected systems, posing a significant risk to users globally.

Discovered by a researcher known as DreyAnd, CVE-2024-51567 enables attackers to bypass authentication through the /dataBases/upgrademysqlstatus endpoint by manipulating the statusfile property with shell metacharacters. This flaw affects CyberPanel versions up to 2.3.6 and the unpatched version 2.3.7, with a CVSS score of 10.0, indicating its critical severity level.

Following the disclosure of this vulnerability on October 27, 2024, it was quickly exploited in the wild. Reports indicate that within days, ransomware groups began targeting vulnerable CyberPanel instances. A monitoring service, LeakIX, noted that approximately 22,000 instances were identified online just before the vulnerability was disclosed, with many being compromised shortly thereafter. By October 29, the number of reachable instances had plummeted to a few hundred due to successful attacks.

CISA has added CVE-2024-51567 to its Known Exploited Vulnerabilities Catalog, emphasizing its active exploitation in cyberattacks. The agency urges organizations using CyberPanel to apply patches immediately and monitor their systems for any signs of compromise. CyberPanel developers responded swiftly to the initial findings by releasing patches on October 23; however, the rapid exploitation highlights a critical communication gap between researchers and software vendors regarding vulnerability disclosures.

In light of these events, organizations are strongly advised to upgrade their CyberPanel installations to version 2.3.8 or later, which addresses this vulnerability and others identified in recent updates. Additionally, implementing robust monitoring practices can help detect any unauthorized access attempts.

As cyber threats continue to evolve, staying informed about vulnerabilities like CVE-2024-51567 is crucial for safeguarding digital assets. The ongoing situation serves as a reminder of the importance of timely patching and proactive security measures in an increasingly hostile cyber landscape. For more technical details and exploit scripts related to this vulnerability, resources are available on GitHub and other cybersecurity advisories.

Visit our website to get cybersecurity updates like this, thesecmaster.com, and our social media page on FacebookLinkedInTwitterTelegramTumblrMedium, and Instagram and subscribe to receive tips like this.  

You may also like these articles:

Anthony Denis

Anthony Denis a Security News Reporter with a Bachelor's in Business Computer Application. Drawing from a decade of digital media marketing experience and two years of freelance writing, he brings technical expertise to cybersecurity journalism. His background in IT, content creation, and social media management enables him to deliver complex security topics with clarity and insight.

Recently added

Learn More About Cyber Security Security & Technology

“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”

Cybersecurity All-in-One For Dummies - 1st Edition

"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.

Tools

Featured

View All

Learn Something New with Free Email subscription

Subscribe

Subscribe