Security News > 2024 > January > 45k Jenkins servers exposed to RCE attacks using public exploits

45k Jenkins servers exposed to RCE attacks using public exploits
2024-01-29 22:06

Researchers found roughly 45,000 Jenkins instances exposed online that are vulnerable to CVE-2023-23897, a critical remote code execution flaw for which multiple public proof-of-concept exploits are in circulation.

Depending on the instance's configuration, attackers could decrypt stored secrets, delete items from Jenkins servers, and download Java heap dumps.

Late last week, security researchers warned of multiple working exploits for CVE-2023-23897, which dramatically elevates the risk for unpatched Jenkins servers and increases the likelihood of in-the-wild exploitation.

Today, threat monitoring service Shadowserver reported that its scanners have "Caught" roughly 45,000 unpatched Jenkins instances, indicating a massive attack surface.

Most of the vulnerable internet-exposed instances are in China and the United States, followed by Germany, India, France, and the UK. Shadowserver's stats represent a dire warning to Jenkins administrators, as hackers are very likely already conducting scans to find potential targets, and CVE-2023-23897 can have severe repercussions if successfully exploited.

Exploits released for critical Jenkins RCE flaw, patch now.


News URL

https://www.bleepingcomputer.com/news/security/45k-jenkins-servers-exposed-to-rce-attacks-using-public-exploits/

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2023-07-10 CVE-2023-23897 Unspecified vulnerability in Ozette Simple Mobile URL Redirect
Cross-Site Request Forgery (CSRF) vulnerability in Ozette Plugins Simple Mobile URL Redirect plugin <= 1.7.2 versions.
network
low complexity
ozette
8.8

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Jenkins 637 21 1029 434 72 1556