Cleo patches critical zero-day exploited in data theft attacks
- Cleo has patched a critical zero-day vulnerability exploited in data theft attacks.
- The vulnerability was actively exploited in the wild, increasing data theft incidents.
- Users are urged to update their software immediately due to the severity of the threat.
- Cleo acknowledges the seriousness of the security flaw.
12 Articles
12 Articles
Immediate patching of actively exploited Cleo flaw urged
Immediate blocking of IP addresses leveraging the issue has also been recommended by Cleo. Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using coupon code: MWNEWS10 f…
Cleo MFT Zero-Day Exploits Are About Escalate, Analysts Warn - Plato Data Intelligence
An active ransomware campaign against the Cleo managed file transfer tool is about to ramp up now that a proof-of-concept exploit for a zero-day flaw in the software has become publicly available. Defenders should brace for widespread deployment of the Cleopatra backdoor and other steps in the attack chain. The flaw, which is the result of an insufficient patch for an arbitrary file write tracked as CVE-2024-50623, is being used for remote code …
Cleo urges customers to ‘immediately’ apply new patch as researchers discover new malware
The bug was initially tagged as CVE-2024-50623 in October and patched by the company, but researchers from cybersecurity firm Huntress discovered that systems were still vulnerable even after applying the fix.
Coverage Details
Bias Distribution
- 100% of the sources are Center
Factuality
To view factuality data please Upgrade to Premium






