Threat actors appear to be attempting to exploit a recently patched Apache HugeGraph vulnerability.
Apache HugeGraph is an open source graph database system that helps users easily build applications based on graph databases.
Its developers informed users in April about an important-severity flaw in HugeGraph-Server that can be exploited for remote command execution. The vulnerability, tracked as CVE-2024-27348, has been patched with the release of version 1.3.0.
The non-profit cybersecurity organization The Shadowserver Foundation reported on Tuesday that it has seen exploitation attempts targeting CVE-2024-27348. Shadowserver has seen attacks originating from eight IP addresses.
The organization noted that attacks appear to have started on June 6, but increased last week. Proof-of-concept (PoC) exploit code for CVE-2024-27348 became available in early June.
SecureLayer7 published technical details for the Apache HugeGraph vulnerability on June 5.
The company assigned the flaw a ‘critical’ severity rating and warned that an attacker can exploit it to bypass sandbox restrictions and achieve remote code execution, enabling them to take complete control of the targeted server.
Related: Organizations Warned of Exploited GeoServer Vulnerability
Related: APT Exploits Windows Zero-Day to Execute Code via Disabled Internet Explorer
Related: Exploitation Attempts Target New MOVEit Transfer Vulnerability
Related: Recent SolarWinds Serv-U Vulnerability Exploited in the Wild