CISA adds Qlik bugs to exploited vulnerabilities catalog

Avatar

Two vulnerabilities affecting a popular data analytics tool were added to the Cybersecurity and Infrastructure Security Agency’s (CISA) list of exploited bugs this week.

On Thursday, CISA added CVE-2023-41265 and CVE-2023-41266 to its catalog, giving federal civilian agencies until December 28 to patch the issues.

Both bugs were found this summer in Qlik Sense — a data analytics tool used widely among government organizations and large businesses. The vulnerabilities provide hackers with an entry point into systems and allow them to elevate their privileges.

“If the two vulnerabilities are combined and successfully exploited, these issues could lead to a compromise of the server running the Qlik Sense software,” the company said in an advisory on December 5. “Qlik has received reports that this vulnerability may be being used by malicious actors.”

CVE-2023-41265 carries a vulnerability severity score of 9.6 and CVE-2023-41266 has a score of 8.2. The vulnerabilities were discovered in August by researchers at cybersecurity firm Praetorian. There are no mitigations and all versions of Qlik Sense Enterprise for Windows before May are vulnerable.

Both issues were used in a series of attacks by the Cactus ransomware gang since they were discovered, according to cybersecurity expert Kevin Beaumont and researchers at Arctic Wolf.

Viakoo Labs Vice President John Gallagher said Qlik Sense is widely used.

“Estimates are there are 40,000 users so as a method of deploying ransomware it’s a good one. Attacks would only be enabled if the threat actor had an internet-exposed instance of Qlik Sense to attach to,” he said.

“In that sense most high value targets (with effective security) would be safe assuming Qlik Sense was deployed properly. As with many high severity vulnerabilities it is a race against time in terms of deploying patches.”

Qlik warned customers that their tools “should not be exposed to the public internet” and that removing them “reduces the attack surface significantly.”

Researchers at Praetorian began to explore issues with Qlik Sense because of the “large number of instances on Shodan (around six thousand externally facing instances), and the high value nature of the software given its usage for data analytics,” they said.

“Because organizations use Qlik Sense for data analytics, we hypothesized that they most likely would provide the application with both database credentials and internal network access to corporate environments. This combination of factors made it a high value target for research purposes,” they said.

In several posts on the social media site Mastodon, Beaumont said searches on Shodan showed that many U.S-based organizations did have their instances exposed to the internet.

In addition to Cactus ransomware actors, several other ransomware gangs are exploiting the bugs, according to Beaumont.

NewsGovernmentCybercrimeTechnology
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

CISA adds Qlik bugs to exploited vulnerabilities catalog

Next Post

FBI explains how companies can delay SEC cyber incident disclosures

Related Posts

‘Konfety’ Ad Fraud Uses 250+ Google Play Decoy Apps to Hide Malicious Twins

Details have emerged about a "massive ad fraud operation" that leverages hundreds of apps on the Google Play Store to perform a host of nefarious activities. The campaign has been codenamed Konfety – the Russian word for Candy – owing to its abuse of a mobile advertising software development kit (SDK) associated with a Russia-based ad network called CaramelAds. "Konfety represents a new form of
Avatar
Read More

Considerations for Operational Technology Cybersecurity

Operational Technology (OT) refers to the hardware and software used to change, monitor, or control the enterprise's physical devices, processes, and events. Unlike traditional Information Technology (IT) systems, OT systems directly impact the physical world. This unique characteristic of OT brings additional cybersecurity considerations not typically present in conventional IT security
Avatar
Read More