Today > 5 Critical | 25 High | 21 Medium vulnerabilities   -   You can now download lists of IOCs here!

Cleo Software Actively Being Exploited in the Wild

Dec. 10, 2024, 3:03 p.m.

Description

A critical vulnerability in Cleo's LexiCom, VLTransfer, and Harmony software, used for file transfer management, is being actively exploited. The flaw allows unauthenticated remote code execution, affecting all versions up to and including 5.8.0.21. Attackers are exploiting this vulnerability to drop malicious files, execute PowerShell commands, and gain persistence on affected systems. The attack chain involves placing files in the 'autorun' directory and leveraging the software's import functionality. Post-exploitation activities include domain reconnaissance and potential Active Directory enumeration. Multiple businesses, particularly in consumer products, food industry, trucking, and shipping sectors, have been compromised. Huntress researchers have developed a proof-of-concept and are working with Cleo to address the issue.

Date

Published: Dec. 10, 2024, 11:40 a.m.

Created: Dec. 10, 2024, 11:40 a.m.

Modified: Dec. 10, 2024, 3:03 p.m.

Indicators

192.119.99.42

209.127.12.38

5.149.249.226

176.123.5.126

Attack Patterns

T1078.002

T1021.001

T1018

T1136

T1059.001

T1087

T1082

T1105

T1083

T1133

T1078

Additional Informations

Retail

Transportation

Manufacturing