Article Details
Scrape Timestamp (UTC): 2024-03-07 12:29:14.156
Original Article Text
Click to Toggle View
Critical TeamCity flaw now widely exploited to create admin accounts. Hackers have started to exploit the critical-severity authentication bypass vulnerability (CVE-2024-27198) in TeamCity On-Premises, which JetBrains addressed in an update on Monday. Exploitation appears to be massive, with hundreds of new users created on unpatched instances of TeamCity exposed on the public web. Risk of supply-chain attacks LeakIX, a search engine for exposed device misconfigurations and vulnerabilities, told BleepingComputer that a little over 1,700 TeamCity servers have yet to receive the fix. Most of the vulnerable hosts indexed by LeakIX are in Germany, the United States, and Russia, followed at a distance by China, the Netherlands, and France. Of these, the platform indicates that hackers have already compromised more than 1,440 instances. "There are between 3 and 300 hundreds users created on compromised instances, usually the pattern is 8 alphanum characters," LeakIX told BleepingComputer. GreyNoise, a company that analyzes internet scanning traffic, also recorded on March 5 a sharp increase in attempts to exploit CVE-2024-27198. According to GreyNoise statistics, most attempts come from systems in the United States on the DigitalOcean hosting infrastructure. Gregory Boddin of LeakIX told BleepingComputer that the TeamCity servers observed are production machines used to build and deploy software. This means that compromising them could lead to supply-chain attacks as they may contain sensitive details such as credentials for the environments where code is deployed, published, or stored (e.g. stores and marketplaces, repositories, company infrastructure). Cybersecurity company Rapid7 expressed the same concern in a blog post analyzing the vulnerability and the ways it can be leveraged in attacks “Compromising a TeamCity server allows an attacker full control over all TeamCity projects, builds, agents and artifacts, and as such is a suitable vector to position an attacker to perform a supply chain attack” - Rapid7 Urgent TeamCity update CVE-2024-27198 has a critical severity score of 9.8 out of 10 and affects all releases up to 2023.11.4 of the on-premise version of TeamCity. It is present in the web component of the server and can allow a remote, unauthenticated attacker to take control of a vulnerable server with administrative privileges. Discovered by Stephen Fewer, a principal security researcher at Rapid7, the vulnerability was reported to JetBrains in mid-February and fixed on March 4. Rapid7 has published a complete technical details on what causes the issue and demonstrated how an attacker could exploit it to achieve remote code execution. JetBrains annouced on Monday the release of TeamCity 2023.11.4 with a fix for CVE-2024-27198, encouraging all users to update instances to the latest version. With massive exploitation already observed, administrators of on-premise TeamCity instances should take urgent steps towards installing the newest release.
Daily Brief Summary
Hackers are actively exploiting a critical authentication bypass vulnerability (CVE-2024-27198) in TeamCity, enabling admin account creation.
The flaw affects the on-premises version of TeamCity and has a severity score of 9.8/10, making it a critical security threat.
Over 1,700 TeamCity servers remain unpatched and are publicly exposed; Germany, the US, and Russia host most of these vulnerable instances.
Compromised TeamCity servers could lead to supply-chain attacks, leaking sensitive details such as deployment credentials.
Most exploitation attempts stem from the US, specifically targeting servers on DigitalOcean's hosting infrastructure.
Discovered by security researcher Stephen Fewer and patched by JetBrains, the vulnerability allows remote attackers to gain administrative control.
JetBrains has released TeamCity 2023.11.4 to address the vulnerability, stressing the importance of an immediate update for administrators.