NOV. 6 UPDATE: Confluence Data Center and Server security advisory CVE-2023-22518

06 Nov 2023 UPDATE

As part of Atlassian's ongoing monitoring and investigation of this CVE, we observed several active exploits and reports of threat actors using ransomware. We have escalated CVE-2023-22518 from CVSS 9.1 to 10, the highest critical rating, due to the change in the scope of the attack. Please review the Threat Detection section on the advisory for additional details.

03 Nov 2023 UPDATE

We received a customer report of an active exploit. Customers must take immediate action to protect their instances. If you already applied the patch, no further action is required.

 UPDATE:

As part of Atlassian's ongoing monitoring of this CVE, we observed publicly posted critical information about the vulnerability which increases risk of exploitation. There are still no reports of an active exploit, though customers must take immediate action to protect their instances. If you already applied the patch, no further action is required.


 ORIGINAL:

An Important Message from Bala Sathiamurthy, Chief Information Security Officer (CISO)

As part of our continuous security assessment processes, we have discovered that Confluence Data Center and Server customers are vulnerable to significant data loss if exploited by an unauthenticated attacker. There are no reports of active exploitation at this time; however, customers must take immediate action to protect their instances. Please read the Critical Security Advisory for instructions and vulnerability details.

Protecting customers' instances is our top priority, and our prompt response demonstrates our dedication to ensuring the safety of our customers and your data. Atlassian is always reviewing security measures to reduce security risks and support our customers in taking timely action. Customers can expect to receive high-priority patches outside of our monthly advisory schedule as necessary. We believe that taking proactive action is the best approach and we appreciate your ongoing partnership.

Note: Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.

If you have questions, please raise a support request via instructions included in the advisory.

Thank you,

Atlassian Security team

2 comments

David Yu
Rising Star
Rising Star
Rising Stars are recognized for providing high-quality answers to other users. Rising Stars receive a certificate of achievement and are on the path to becoming Community Leaders.
October 30, 2023

I guess this explains why source code access was recently disabled.

Jay Moczulski
Contributor
October 31, 2023

Is this also critical for Data Center instances that have two factor authentication via global protect vpn? Or does that lower the risk of attack? 

Comment

Log in or Sign up to comment
TAGS
AUG Leaders

Atlassian Community Events