Security

Patches

JetBrains urges swift patching of latest critical TeamCity flaw

Cloud version is safe, but no assurances offered about possible on-prem exploits


JetBrains is encouraging all users of TeamCity (on-prem) to upgrade to the latest version following the disclosure of a critical vulnerability in the CI/CD tool.

Tracked as CVE-2024-23917, the vulnerability has been assigned a provisional 9.8 CVSS score and allows unauthenticated remote attackers to take over vulnerable servers with admin privileges.

"All versions from 2017.1 through 2023.11.2 are affected by this issue," Daniel Gallo, solutions engineer at JetBrains, said in an advisory. "The issue has been patched in 2023.11.3. We recommend upgrading as soon as possible."

The vulnerability only requires attention for admins of on-prem servers since TeamCity Cloud has already been patched. JetBrains also confirmed that no attacks had been detected against TeamCity Cloud, but made no such assertions about the on-prem product.

Patching can be carried out by downloading the latest version, using the automatic update feature within TeamCity itself, or by using the security patch plugin which addresses CVE-2024-23917 only.

JetBrains said it's always best to just upgrade the whole server – as users will then receive all the other security fixes that come with it – rather than just patching the single vulnerability.

If, for whatever reason, any of the patches or mitigations can't be applied immediately, it's recommended that public-facing TeamCity servers should be made inaccessible until the critical flaw is addressed.

The disclosure comes just a few months after it was revealed that state-sponsored attackers from Russia and North Korea were separately targeting TeamCity servers vulnerable to a similar flaw announced in September.

CVE-2023-42793 also registered a 9.8 severity score and activity from foreign offensive cyber units prompted leading Western authorities to issue an advisory, urging swift patching.

There was no evidence to suggest the access the attackers had was used to lay the groundwork for a SolarWinds-like attack, which is always the fear when there are reports of CI/CD compromises.

Instead, Russia's Foreign Intelligence Service (SVR) exploited the vulnerability to move laterally around victim's networks and plant backdoors to facilitate follow-on attacks.

The SVR used the GraphicalProton backdoor in attacks driven by an MO that doesn't appear to have changed much in the past ten years. Russia is well known for its propensity to steal sensitive, confidential information in offensive cyber operations. ®

Send us news
Post a comment

Tired of airport security queues? SQL inject yourself into the cockpit, claim researchers

Infosec hounds say they spotted vulnerability during routine travel in the US

Check your IP cameras: There's a new Mirai botnet on the rise

Also, US offering $2.5M for Belarusian hacker, Backpage kingpins jailed, additional MOVEit victims, and more

US sues Georgia Tech over alleged cybersecurity failings as a Pentagon contractor

Rap sheet spells out major no-nos after disgruntled staff blow whistle

Brain Cipher claims attack on Olympic venue, promises 300 GB data leak

French police reckon financial system targeted during Summer Games

Multiple flaws in Microsoft macOS apps unpatched despite potential risks

Windows giant tells Cisco Talos it isn't fixing them

Deadline looms: Google Workspace mandates OAuth by September 30

27 days to get your users' third-party apps on Google’s sign-in

RansomHub hits 210 victims in just 6 months

The ransomware gang recruits high-profile affiliates from LockBit and ALPHV

AMD reverses course: Ryzen 3000 CPUs will get SinkClose patch after all

Still no love for 1000- or 2000-series

Ransomware batters critical industries, but takedowns hint at relief

Whether attack slowdown continues downward trend is the million dollar question that security researchers can't answer

RansomHub-linked EDR-killing malware spotted in the wild

Also: Your external-facing NetSuite sites need a review; five popular malware varieties for Q2, and more

110K domains targeted in 'sophisticated' AWS cloud extortion campaign

If you needed yet another reminder of what happens when security basics go awry

Russia tells citizens to switch off home surveillance because the Ukrainians are coming

Forget about your love life too, no dating apps until the war is over