Article Details

Scrape Timestamp (UTC): 2025-09-04 23:19:34.086

Source: https://www.theregister.com/2025/09/04/unknown_miscreants_snooping_around_sitecore/

Original Article Text

Click to Toggle View

Attackers snooping around Sitecore, dropping malware via public sample keys. You cut and pasted the machine key from the official documentation? Ouch. Unknown miscreants are exploiting a configuration vulnerability in multiple Sitecore products to achieve remote code execution via a publicly exposed key and deploy snooping malware on infected machines. All versions of Sitecore Experience Manager (XM), Experience Platform (XP), Experience Commerce (XC), and Managed Cloud remain "potentially impacted" by CVE-2025-53690, a ViewState deserialization vulnerability, if they are deployed in a multi-instance mode with customer-managed static machine keys, the business software provider warned in a Wednesday security bulletin. The bug is due to a configuration issue - not a software hole - and affects customers using the sample key provided with deployment instructions for Sitecore XP 9.0 or earlier and Sitecore Active Directory 1.4 and earlier versions. Updated deployments automatically generate a random machine key. If you're stuck with one of the sample keys from Sitecore's old docs instead of generating your own, treat your install as vulnerable and rotate those keys now. "Successful exploitation of the related vulnerability might lead to remote code execution and non-authorized access to information," the vendor noted. Plus, it appears that criminals seized upon these publicly documented keys to remotely execute code and snoop around exposed instances before Sitecore issued its guidance. On Wednesday, in conjunction with Sitecore's bulletin, Mandiant published its own account of an attack disrupted midway, during which the attacker used the exposed ASP.NET machine key to perform RCE. Then on Thursday, the US Cybersecurity and Infrastructure Security Agency added CVE-2025-53690 to its Known Exploited Vulnerabilities catalog. Mandiant said it disrupted the attack early, which prevented the incident responders from observing the full lifecycle and determining the attackers' motivations.  Still, "the attacker's deep understanding of the compromised product and the exploited vulnerability was evident in their progression from initial server compromise to privilege escalation," the threat intelligence team noted. After exploiting CVE-2025-53690 on the vulnerable, internet-facing instance, the attacker deployed a ViewState payload that contained WEEPSTEEL malware, Mandiant's Rommel Joven, Josh Fleischer, Joseph Sciuto, Andi Slok, and Choon Kiat Ng wrote. ViewState is an ASP.NET feature to preserve webpage and control values between postbacks, and a ViewState deserialization attack occurs when an attacker tricks the server into processing a malicious ViewState payload as legitimate data. "When machine keys (which protect ViewState integrity and confidentiality) are compromised, the application effectively loses its ability to differentiate between legitimate and malicious ViewState payloads sent to the server," the Mandiant team explained. After abusing the vulnerability to remotely deploy WEEPSTEEL, a malware designed to collect system, network, and user information, the attackers used their access to archive the root directory of the web application, we're told. This indicates "an intent to obtain sensitive files such as web.config," and "was followed by host and network reconnaissance," the researchers said. The miscreants also elevated privileges after breaking in, escalating their access to system and admin level, and then attempted to compromise cached administrator credentials, which also enabled lateral movement via remote desktop protocol. Neither Mandiant nor Sitecore immediately responded to The Register's questions about the scope of these attacks, and who is believed to be behind them. We will update this story if we hear back from either company.

Daily Brief Summary

VULNERABILITIES // Sitecore Vulnerability Exploited for Remote Code Execution and Malware Deployment

Attackers are exploiting a configuration flaw in Sitecore products, specifically targeting a ViewState deserialization vulnerability, CVE-2025-53690, to achieve remote code execution.

The vulnerability affects Sitecore Experience Manager, Experience Platform, Experience Commerce, and Managed Cloud, particularly when using static machine keys from older documentation.

Successful exploitation can lead to unauthorized access and deployment of WEEPSTEEL malware, which collects system, network, and user information from compromised machines.

Mandiant disrupted an attack exploiting this flaw, preventing full lifecycle observation but noting attackers' deep understanding of the vulnerability and product.

The US Cybersecurity and Infrastructure Security Agency has added CVE-2025-53690 to its Known Exploited Vulnerabilities catalog, urging immediate key rotation and patching.

Sitecore's updated deployments now generate random machine keys, mitigating the risk; organizations using older versions should update and secure their configurations promptly.

This incident underscores the importance of regularly updating security configurations and avoiding the use of default or sample keys in production environments.