Home>
Angreifer nutzen Zero-Day-Schwachstelle in Atlassian Confluence für Remote Code Execution
SECURITY INSIGHTS | 3. June 2022
Cybercriminals are currently exploiting a critical vulnerability in Confluence Server and Data Center to execute malicious code on enterprise servers. Myra is providing customers with a new ruleset for Hyperscale WAF to proactively mitigate the threat.
Atlassian has since provided patched versions of the affected products. With the Myra Hyperscale WAF, you protect your systems until the changeover to these versions has taken place. This will ensure you have the time you need for patch management.
A critical vulnerability (CVE-2022-26134) is currently threatening many organizations' Confluence servers. The still unpatched vulnerability allows attackers to execute remote code via the software of the manufacturer Atlassian. According to Atlassian, all supported versions of Confluence Server and Confluence Data Center are affected. Further information about the vulnerability is currently not known.
Until the first security updates and workarounds for the vulnerability are available, organizations can protect themselves from attacks with Myra Hyperscale WAF and a ruleset developed specifically for the threat. Additionally, Myra can further shrink the attack surface with granular IP whitelisting and blacklisting to best minimize risk.
Security Insights
15 July 2020
Myra News
18 December 2019
Myra News
21 October 2021