Hello Community,
06 Nov 2023 UPDATE
As part of Atlassian's ongoing monitoring and investigation of this CVE, we observed several active exploits and reports of threat actors using ransomware. We have escalated CVE-2023-22518 from CVSS 9.1 to 10, the highest critical rating, due to the change in the scope of the attack. Please review the Threat Detection section on the advisory for additional details.
03 Nov 2023 UPDATE:
We received a customer report of an active exploit. Customers must take immediate action to protect their instances. If you already applied the patch, no further action is required.
UPDATE:
As part of Atlassian's ongoing monitoring of this CVE, we observed publicly posted critical information about the vulnerability which increases risk of exploitation. There are still no reports of an active exploit, though customers must take immediate action to protect their instances. If you already applied the patch, no further action is required.
ORIGINAL:
Please read this important security message from Bala Sathiamurthy, Chief Information Security Officer, and take immediate action to patch your instance.
An Important Message from Bala Sathiamurthy, Chief Information Security Officer (CISO) As part of our continuous security assessment processes, we have discovered that Confluence Data Center and Server customers are vulnerable to significant data loss if exploited by an unauthenticated attacker. There are no reports of active exploitation at this time; however, customers must take immediate action to protect their instances. Please read the Critical Security Advisory for instructions and vulnerability details. Protecting customers' instances is our top priority, and our prompt response demonstrates our dedication to ensuring the safety of our customers and your data. Atlassian is always reviewing security measures to reduce security risks and support our customers in taking timely action. Customers can expect to receive high-priority patches outside of our monthly advisory schedule as necessary. We believe that taking proactive action is the best approach and we appreciate your ongoing partnership. |
Note: Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
If you have questions, please raise a support request via instructions included in the advisory.
Thank you,
Atlassian Trust team
This Trust and Community post is a cross-post of the approved post by Ulisses Breier: Confluence Data Center and Server security advisory CVE-2023-22518
Jodie Vlassis
Senior Trust & Security SME
Atlassian
Sydney, Australia
11 accepted answers
1 comment