Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
Reference:
Advisory #2023-84
Version:
1.0
Affected software:
ColdFusion 2018 - Update 18 and earlier versions
ColdFusion 2021 - Update 8 and earlier versions
ColdFusion 2023 - Update 2 and earlier versions
Type:
Remote code execution and security feature bypass
CVE/CVSS:
CVE-2023-38204 / CVSS 3.1 score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVE-2023-38205 / CVSS 3.1 score: 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
CVE-2023-38206 / CVSS 3.1 score: 5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
https://helpx.adobe.com/security/products/coldfusion/apsb23-47.html
The vulnerabilities, if exploited, could allow an unauthenticated attacker to execute arbitrary code or to bypass security features.
CVE-2023-38204 is the most critical flaw patched, as it is a remote code execution vulnerability, but was not yet exploited in the wild. An attacker could exploit the vulnerability to elevate privileges or to gain control over the affected system. The exploitation of the vulnerability would highly impact the Confidentiality, Integrity and Availability of the affected systems.
On the other hand, Adobe confirmed being aware that CVE-2023-38205 has been exploited in the wild in limited attacks targeting Adobe ColdFusion clients. The exploitation of this flaw would have a high impact only on the Confidentiality of the targeted system.
To address these vulnerabilities, Adobe advises users to urgently update as follows:
Product | Update number | Platform |
ColdFusion 2023 | Update 3 | All |
ColdFusion 2021 | Update 9 | All |
ColdFusion 2018 | Update 19 | All |
Adobe also recommends updating the ColdFusion JDK/JRE LTS version to the latest update release, as applying the ColdFusion update without a corresponding JDK update will NOT secure the server.
Customers are also advised to apply the security configuration settings as outlined on the ColdFusion Security page as well as review the respective Lockdown guides.
In case of an intrusion, you can report an incident via: https://ccb.belgium.be/cert/report-incident
https://helpx.adobe.com/pdf/coldfusion2023-suport-matrix.pdf
https://helpx.adobe.com/pdf/coldfusion2021-support-matrix.pdf
https://helpx.adobe.com/pdf/coldfusion2018-support-matrix.pdf
https://www.securityweek.com/adobe-releases-new-patches-for-exploited-coldfusion-vulnerabilities/