CVE-2023-27532

Vulnerability updated 2 months ago (2024-09-12T08:17:43.312Z)
Download STIX
Preview STIX
CVE-2023-27532 is a high-severity vulnerability found in the Veeam Backup & Replication software. This flaw, discovered and disclosed in March 2023, allows unauthenticated attackers to breach backup infrastructure hosts, posing significant risk to small and midsize businesses (SMBs) that commonly use this software. The vulnerability was exploited soon after its disclosure, but it wasn't until August that it was added to the Known Exploited Vulnerabilities (KEV) list by the Cybersecurity and Infrastructure Security Agency (CISA). Caitlin Condon, head of vulnerability research at Rapid7, highlights the importance of not solely relying on the KEV list for vulnerability management programs due to such time lags. Several cybercriminal groups have been observed exploiting this vulnerability. Notably, the Cuba ransomware group targeted a US critical infrastructure organization and an IT integrator in Latin America using CVE-2023-27532. Similarly, the CosmicBeetle group has been seen opportunistically targeting SMBs by scanning for and attempting to exploit this and other vulnerabilities, leading to smaller businesses making up the majority of their victims. The exploitation of CVE-2023-27532 indicates a shift in tactics by these groups, increasing the urgency for organizations to patch this vulnerability. In June, another campaign leveraged both the Microsoft NetLogon protocol flaw (CVE2020-1472) and the Veeam software vulnerability (CVE-2023-27532). This underscores the ongoing threat posed by CVE-2023-27532 and emphasizes the need for organizations to stay vigilant about their cybersecurity practices, promptly apply patches when available, and consistently monitor for potential exploits. The continued exploitation of this vulnerability demonstrates the importance of rapid response to disclosed vulnerabilities, particularly those with high severity ratings.
Description last updated: 2024-09-12T08:15:44.722Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Veeam
Ransomware
Vulnerability
Exploit
Blackberry
Cuba
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the CVE-2023-27532 Vulnerability was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
DARKReading
2 months ago
BankInfoSecurity
2 months ago
ESET
2 months ago
BankInfoSecurity
2 months ago
Securityaffairs
4 months ago
Checkpoint
4 months ago
DARKReading
4 months ago
Securelist
a year ago
DARKReading
a year ago
DARKReading
a year ago
CERT-EU
a year ago
Securityaffairs
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
BankInfoSecurity
a year ago
CERT-EU
a year ago
CERT-EU
a year ago