Cleo Software Actively Being Exploited in the Wild
Dec. 10, 2024, 3:03 p.m.
Tags
External References
Description
A critical vulnerability in Cleo's LexiCom, VLTransfer, and Harmony software, used for file transfer management, is being actively exploited. The flaw allows unauthenticated remote code execution, affecting all versions up to and including 5.8.0.21. Attackers are exploiting this vulnerability to drop malicious files, execute PowerShell commands, and gain persistence on affected systems. The attack chain involves placing files in the 'autorun' directory and leveraging the software's import functionality. Post-exploitation activities include domain reconnaissance and potential Active Directory enumeration. Multiple businesses, particularly in consumer products, food industry, trucking, and shipping sectors, have been compromised. Huntress researchers have developed a proof-of-concept and are working with Cleo to address the issue.
Date
Published: Dec. 10, 2024, 11:40 a.m.
Created: Dec. 10, 2024, 11:40 a.m.
Modified: Dec. 10, 2024, 3:03 p.m.
Attack Patterns
T1078.002
T1021.001
T1018
T1136
T1059.001
T1087
T1082
T1105
T1083
T1133
T1078
Additional Informations
Retail
Transportation
Manufacturing