Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
Reference:
Advisory #2023-131
Version:
1.0
Affected software:
Confluence Data Center and Server prior to 7.19.16
Confluence Data Center and Server prior to 8.3.4
Confluence Data Center and Server prior to 8.4.4
Confluence Data Center and Server prior to 8.5.3
Confluence Data Center and Server prior to 8.6.1
Type:
Improper Authorization
CVE/CVSS:
CVE-2023-22518
CVSS: 9.1 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
CVE-2023-22518 has been categorized as an improper authorization vulnerability, but no other details have been shared by the vendor Atlassian. It can lead to significant data loss if exploited by an unauthenticated attacker.
On the 31st of October Atlassian published a security advisory detailing a zero-day vulnerability in Confluence Data Center and Confluence Server. CVE-2023-22518 was assigned to this vulnerability.
Atlassian discovered the vulnerability as part of their continuous security assessment process. They did not yet receive reports of active exploitations at the time of reporting.
The severity of this vulnerability is crucial due to multiple factors:
Upgrade
Mitigation/workaround
If unable to patch, it is recommended to:
Monitor/Detect
It is important to notice that compromised instances will still be affected after upgrading to a fixed version. This is because the attacker can create administrator accounts in the vulnerable instance.
The CCB recommends organizations to upscale monitoring and detection capabilities and to detect any related suspicious activity, ensuring a fast response in case of an intrusion.
In case of an intrusion, you can report an incident via: https://ccb.belgium.be/cert/report-incident
While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.
When applying patches to systems that have been vulnerable to an authentication bypass, a proactive threat assessment should be performed to verify the device was not accessed from an unknown IP or location.