Are Your Cleo File Transfer Systems Vulnerable to Remote Code Attacks?

A significant vulnerability in Cleo-managed file transfer software has prompted urgent warnings from cybersecurity agencies. Users must ensure their systems are not exposed to the internet following reports of massive exploitation by threat actors. On December 3, 2024, Huntress, a cybersecurity company, identified that threat actors have been leveraging this vulnerability, which is affecting fully patched systems of Cleo’s LexiCom, VLTransfer, and Harmony software. This vulnerability, tracked as CVE-2024-50623, allows unauthenticated remote code execution due to an unrestricted file upload flaw, posing significant risks to affected systems.

The Nature of the Vulnerability

CVE-2024-50623 and Its Impact

Cleo, a company serving over 4,200 customers worldwide, issued an advisory warning of another unauthenticated malicious host vulnerability that could potentially lead to remote code execution. Huntress’s discovery that patches for CVE-2024-50623 do not fully mitigate the underlying flaw magnifies the threat to Cleo Harmony, VLTrader, and LexiCom software (up to version 5.8.0.23). This has enabled cyberattacks to deploy multiple files, including an XML file with an embedded PowerShell command, which retrieves a Java Archive (JAR) file from a remote server. The vulnerable systems include those within consumer products, logistics, shipping organizations, and food supplier sectors, with a notable spike in exploitation activities on December 8, 2024.

The attack orchestrated by these threat actors is sophisticated, involving the integration of various files to facilitate remote code execution. The dissemination of an XML file that triggers a PowerShell command outlines the meticulous nature of the attack strategy. The downloaded JAR file is pivotal in establishing a connection with the threat actor’s remote server, thus providing them with access to the compromised network. The widespread implications of this flaw across major industries underline the urgency and the severity of the cybersecurity threat. Enterprises within these sectors must remain vigilant and proactive to prevent further exploitation of the vulnerability.

Vulnerability Exploitation and Emerging Threat Actors

Ransomware groups, including Cl0p (aka Lace Tempest), have historically targeted a range of managed file transfer tools. Security researcher Kevin Beaumont linked a zero-day exploit to the Termite ransomware group, which targeted Cleo LexiCom, VLTransfer, and Harmony. Rapid7 confirmed successful exploitation instances within customer environments, while Symantec’s Threat Hunter Team suggested that Termite used a modified version of Babuk ransomware, which encrypted files with a .termite file extension. Additionally, Censys, an attack surface management firm, reported that 1,342 instances of Cleo Harmony, VLTrader, and LexiCom were exposed online, predominantly in the United States, followed by Canada, Mexico, Ireland, and Germany.

The implications of this vulnerability stretch beyond the initial exploitation phase. The rapid adaptation of the Termite group, using a customized version of Babuk ransomware, underscores the evolving threat landscape. The exposure of a substantial number of instances predominantly in North America and Europe indicates a significant risk to many organizations. The deployment of a ransomware variant with a .termite file extension adds a new layer of complexity, reflecting advanced threat actor capabilities. Therefore, businesses must reassess their cybersecurity strategies to address these evolving threats effectively.

Response and Mitigation Efforts

Immediate Actions and Protective Measures

Jamie Levy of Huntress correlates Blue Yonder’s vulnerability exploit to Termite, suggesting possible connections between Cl0p’s reduced activity and Termite’s rise. In light of the identified critical vulnerability, a Cleo spokesperson stated that the company had launched an investigation with cybersecurity experts, notified customers, and provided immediate mitigation steps while developing a permanent patch. Cleo continues to support its customers with enhanced 24/7 technical assistance and advises regular checks of their security bulletin webpage for updates. The company’s proactive approach aims to mitigate the risks associated with CVE-2024-50623.

The correlation identified by Jamie Levy hints at a strategic adjustment within the threat actor community. Cleo’s immediate actions, including notifying customers and offering round-the-clock technical support, reflect a robust incident response strategy. These measures are designed to offer immediate relief while a more permanent solution is being crafted. Customers are encouraged to remain engaged with Cleo’s updates and advisories to ensure they are equipped with the latest defenses against potential exploits.

Long-Term Security Enhancements

A critical vulnerability in Cleo’s managed file transfer software has led to urgent warnings from cybersecurity agencies, advising users to ensure their systems are not exposed to internet threats. On December 3, 2024, cybersecurity firm Huntress disclosed that attackers are exploiting this vulnerability, which compromises even fully patched systems of Cleo’s LexiCom, VLTransfer, and Harmony software. This security flaw, identified as CVE-2024-50623, permits unauthenticated remote code execution due to an unrestricted file upload issue, creating substantial risks for affected systems.

Huntress highlighted that cybercriminals are actively targeting these systems, emphasizing the urgency for users to implement protective measures. The unrestricted file upload flaw bypasses traditional security controls, allowing attackers to execute malicious code remotely. This can lead to significant data breaches, system compromises, and potentially severe financial losses. Users are strongly urged to disconnect any exposed systems from the internet and follow the latest security advisories to mitigate the risks associated with this critical vulnerability.

Explore more