The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical OS command injection vulnerability (CVE-2024-12686) found in BeyondTrust’s Privileged Remote Access (PRA) and Remote Support (RS) tools to its Known Exploited Vulnerabilities (KEV) catalog as this vulnerability has been actively exploited in the wild.
The flaw, identified as CWE-78: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’), allows attackers with existing administrative access to upload a malicious file and execute commands on the underlying operating system remotely.
If exploited successfully, attackers could manipulate systems within the permissions of the affected application, leading to potentially severe outcomes.
This vulnerability poses a higher risk in scenarios where applications or processes do not follow the principle of least privilege, as attackers could gain elevated system access, perform unauthorized actions, and compromise critical data or infrastructure.
CISA’s addition of this vulnerability to its KEV catalog confirms that it has been observed that the vulnerability is actively exploited in attacks.
Organizations using BeyondTrust’s PRA or RS solutions are strongly advised to treat this vulnerability as a priority in their remediation efforts.
Exploitation of this vulnerability could lead to data breaches, remote code execution, operational downtime, or damage to systems impacted by the attack.
This OS command injection vulnerability can manifest in two significant ways:
system("nslookup [HOSTNAME]")
), attackers can inject malicious commands if input sanitization is inadequate.exec([COMMAND])
) are at risk of being compromised if their mechanisms for validating inputs are lax, granting attackers full control over commands executed on the system.CISA’s Known Exploited Vulnerabilities (KEV) catalog serves as a critical resource for network defenders, offering an authoritative list of vulnerabilities that have been exploited in the wild.
By adding this BeyondTrust PRA vulnerability to the catalog, CISA underscores its commitment to helping organizations prioritize and address threats that are actively being weaponized by threat actors.
As part of their vulnerability management frameworks, organizations are urged to use the KEV catalog to effectively triage and remediate critical issues.
“For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.” CISA Said.
Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free
To minimize exposure to this critical vulnerability, organizations must act swiftly.
Active exploitation of this vulnerability highlights the rising sophistication and persistence of cyber threats targeting privileged access management tools.
These tools often serve as gateways to highly sensitive systems and data, making them attractive targets for attackers. Organizations must remain vigilant, routinely monitor for vulnerabilities, and use resources like CISA’s KEV catalog to stay ahead of emerging threats.
The exploitation of BeyondTrust Privileged Remote Access is a stark reminder of the rapidly evolving threat landscape.
Organizations are urged to act swiftly by applying patches, reviewing their security frameworks, and leveraging the KEV catalog for vulnerability prioritization. Preventative action is critical to safeguarding systems and ensuring resilience against future attacks.
Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates!
A newly discovered malware campaign is targeting Docker environments, employing a sophisticated, multi-layered obfuscation technique…
The pace of technological change in today’s business environment is unprecedented. Organizations are racing to…
Cyber risk appetite represents the amount and type of cyber risk an organization is willing…
A new campaign by Russian threat actors. These actors are exploiting legitimate Microsoft OAuth 2.0…
Security researchers at Fortinet's FortiGuard Labs have uncovered a sophisticated phishing campaign that uses weaponized…
British retail giant Marks & Spencer (M&S) has confirmed it is dealing with a significant…