Security News > 2023 > October > Atlassian patches critical Confluence bug, urges for immediate action (CVE-2023-22518)
Atlassian is urging enterprise administrators to update their on-premises Confluence Data Center and Server installations quickly to plug a critical security vulnerability that could lead to "Significant data loss if exploited by an unauthenticated attacker."
"Versions outside of the support window may also be affected, so Atlassian recommends you upgrade to a fixed LTS version or later," the company said.
"Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue."
Even though "There are no reports of active exploitation at this time", Atlassian says that all publicly accessible on-prem instances should be upgraded immediately.
Vulnerable Atlassian Confluence instances are often targeted by attackers.
Atlassian pushed out critical patches for Confluence Data Center and Server earlier this month, when it fixed CVE-2023-22515, a broken access control zero-day flaw that was being exploited by a state-backed threat actor.
News URL
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-10-04 | CVE-2023-22515 | Unspecified vulnerability in Atlassian Confluence Data Center and Confluence Server Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. | 9.8 |