Apache HugeGraph Vulnerability Exploited in Wild

Share This Post

Threat actors appear to be attempting to exploit a recently patched Apache HugeGraph vulnerability.

Apache HugeGraph is an open source graph database system that helps users easily build applications based on graph databases.

Its developers informed users in April about an important-severity flaw in HugeGraph-Server that can be exploited for remote command execution. The vulnerability, tracked as CVE-2024-27348, has been patched with the release of version 1.3.0.

The non-profit cybersecurity organization The Shadowserver Foundation reported on Tuesday that it has seen exploitation attempts targeting CVE-2024-27348. Shadowserver has seen attacks originating from eight IP addresses. 

The organization noted that attacks appear to have started on June 6, but increased last week. Proof-of-concept (PoC) exploit code for CVE-2024-27348 became available in early June. 

SecureLayer7 published technical details for the Apache HugeGraph vulnerability on June 5.

The company assigned the flaw a ‘critical’ severity rating and warned that an attacker can exploit it to bypass sandbox restrictions and achieve remote code execution, enabling them to take complete control of the targeted server. 

Related: Organizations Warned of Exploited GeoServer Vulnerability

Advertisement. Scroll to continue reading.

Related: APT Exploits Windows Zero-Day to Execute Code via Disabled Internet Explorer

Related: Exploitation Attempts Target New MOVEit Transfer Vulnerability

Related: Recent SolarWinds Serv-U Vulnerability Exploited in the Wild

This post was originally published on this site

More Articles

Article

Navigating SEC Regulations In Cybersecurity And Incident Response

Free video resource for cybersecurity professionals. As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an investigation, handling, and responding to incidents.