Article Details

Scrape Timestamp (UTC): 2024-10-22 04:48:02.415

Source: https://thehackernews.com/2024/10/cisa-adds-sciencelogic-sl1.html

Original Article Text

Click to Toggle View

CISA Adds ScienceLogic SL1 Vulnerability to Exploited Catalog After Active Zero-Day Attack. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical security flaw impacting ScienceLogic SL1 to its Known Exploited Vulnerabilities (KEV) catalog, following reports of active exploitation as a zero-day. The vulnerability in question, tracked as CVE-2024-9537 (CVSS v4 score: 9.3), refers to a bug involving an unspecified third-party component that could lead to remote code execution. The issue has since been addressed in versions 12.1.3, 12.2.3, and 12.3 and later. Fixes have also been made available for version 10.1.x, 10.2.x, 11.1.x, 11.2.x, and 11.3.x. The development comes weeks after cloud hosting provider Rackspace acknowledged that it "became aware of an issue with the ScienceLogic EM7 Portal," prompting it to take its dashboard offline towards the end of last month. "We have confirmed that the exploit of this third-party application resulted in access to three internal Rackspace monitoring web servers," an account named ynezzor said in an X post on September 28, 2024. It's not clear who is behind the attack, although Rackspace has confirmed to Bleeping Computer that the zero-day exploitation led to unauthorized access to its internal performance reporting systems and that it has notified all impacted customers. The breach was first reported by The Register. Federal Civilian Executive Branch (FCEB) agencies are required to apply the fixes by November 11, 2024, to counter possible threats to their networks. Fortinet Patches Likely Exploited Flaw The development comes as Fortinet has released security updates for FortiManager to remediate a vulnerability that is reportedly being exploited by China-linked threat actors. Details about the flaw are presently unknown, although Fortinet, in the past, has sent out confidential customer communications in advance to help them bolster their defenses prior to it being released to a broader audience. The Hacker News has reached out to the company, and we will update the story if we hear back. "FortiGate have released one of the six new versions of FortiManager which fix the actively exploited zero day in the product... but they've not issued a CVE or documented the issue existing in the release notes. Next week maybe?," security researcher Kevin Beaumont said on Mastodon. "Fortigate currently having the world's least secret zero day used by China play out, including in FortiManager Cloud... but everybody is confused." Earlier this month, CISA added another critical flaw impacting Fortinet FortiOS, FortiPAM, FortiProxy, and FortiWeb (CVE-2024-23113, CVSS score: 9.8) to its KEV catalog, based on evidence of in-the-wild exploitation.

Daily Brief Summary

DATA BREACH // Critical Exploit Hits ScienceLogic SL1, Rackspace Internal Systems Affected

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently catalogued a critical vulnerability in ScienceLogic SL1, labeled CVE-2024-9537, due to active exploitation leading to remote code execution.

The vulnerability affected various versions of the application, with patches and fixes now released for versions ranging from 10.1.x to 12.3 and later.

Cloud hosting provider Rackspace discovered unauthorized access to three of its internal monitoring web servers due to this zero-day exploit in the ScienceLogic EM7 Portal.

In response, Rackspace took significant measures including taking its dashboard offline and notifying all customers potentially impacted by the breach.

This breach coincided with another report of Fortinet's ongoing issue with a zero-day exploit in FortiManager, which is suspected to be exploited by China-linked actors, showing a broader trend of cybersecurity threats within industry-leading software.

CISA has set a deadline of November 11, 2024, for Federal Civilian Executive Branch agencies to implement the necessary SecurityLogic SL1 patches to mitigate further risk.