17 min read
Cyber Threat Intelligence Report
This week, we briefed our clients on recent supply chain attacks to raise awareness and help organizations identify whether they have been attacked.
1 min read
PacketWatch Team Sixty43
:
December 13, 2023
On December 7, Apache released a patch for their open-source Model-View-Controller (MVC) framework, Apache Struts.
This patch is to address a new critical unauthenticated file upload vulnerability that can lead to remote code execution (RCE), assigned to CVE-2023-50164.
Proof of exploit code is publicly available and evidence of active exploitation was observed on December 13.
Many 3rd party vendors leverage the Apache Struts framework in their products. Cisco released an advisory detailing which of their products are affected by the vulnerability, which can be found here.
Update vulnerable versions to the fixed version:
If you have any web-facing sites or applications, please check with your vendor if they leverage Apache Struts, and apply the appropriate patch. All vulnerable Apache Struts instances should be patched immediately.
Kindly be advised that the information contained in this article is presented with no final evaluation and should be considered raw data. The sole purpose of this information is to provide situational awareness based on the currently available knowledge. We recommend exercising caution and conducting further research as necessary before making any decisions based on this information.
17 min read
This week, we briefed our clients on recent supply chain attacks to raise awareness and help organizations identify whether they have been attacked.
17 min read
This week, we briefed our clients on the findings from Google's 2025 ransomware investigations. We highlighted the key TTPs used by ransomware...
16 min read
This week, we briefed our clients on a wave of new phishing campaigns worth noting due to their large scale and varied techniques—here are the TTPs.