CVE-2024-50623

Published Oct 28, 2024

Last updated a month ago

Insights

Analysis from the Intruder Security Team
Published Dec 10, 2024

CVE-2024-50623 can be exploited by an unauthenticated attacker to gain remote code execution on affected Cleo servers. Widespread exploitation has been observed. The vendor's advisory page is available here.

John Hammond at Huntress has released a technical article regarding this vulnerability, including a list of IOC's from live attacks in the wild. Originally it was believed that this patch was insufficient in fixing this CVE, due to ongoing exploitation against patched hosts. However, it seems that there is a second unauthenticated remote code execution vulnerability which does not carry a CVE currently. Further details regarding this unknown CVE can be found here.

Overview

Description
In Cleo Harmony before 5.8.0.21, VLTrader before 5.8.0.21, and LexiCom before 5.8.0.21, there is an unrestricted file upload and download that could lead to remote code execution.
Source
cve@mitre.org
NVD status
Modified

Risk scores

CVSS 3.1

Type
Primary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

Known exploits

Data from CISA

Vulnerability name
Cleo Multiple Products Unrestricted File Upload Vulnerability
Exploit added on
Dec 13, 2024
Exploit action due
Jan 3, 2025
Required action
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Weaknesses

cve@mitre.org
CWE-434
nvd@nist.gov
CWE-434
134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE-434

Social media

Hype score
Not currently trending
  1. 🔵 Cleo Unrestricted File Upload Vulnerability (#CVE-2024-50623) https://t.co/4mdHpnaYf6

    @dailycve

    30 Dec 2024

    3 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. #Cl0p ransomware lists 66 Cleo victims, exploiting CVE-2024-50623 for RCE. 48-hour ultimatum for ransom negotiations. #infosec #cyber #security @TechRadar https://t.co/bIgZuqSFJq

    @gothburz

    30 Dec 2024

    3 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. Clop ransomware gang is now extorting 66 victims from its Cleo data theft, demanding action in 48 hours or else! They exploited a zero-day vulnerability (CVE-2024-50623). ⏳💻 #CleoDataTheft #ClopRansomware #DataBreach #CybersecurityNews link: https://t.co/vYvPzvDfTl https://t.co

    @TweetThreatNews

    26 Dec 2024

    71 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  4. Clopランサムウェア集団がCleoからのデータ漏洩により66被害企業を脅迫している。対応期限は48時間後。CVE-2024-50623の悪用。マクニカの瀬治山豊氏(@nekono_naha)によると、企業名の一部は伏せられているが一部企業は公開Web上のサーバとの突合で特定可能だとしている。 https://t.co/fGViNqCEga

    @__kokumoto

    24 Dec 2024

    1709 Impressions

    7 Retweets

    9 Likes

    2 Bookmarks

    1 Reply

    0 Quotes

  5. Cleo の脆弱性 CVE-2024-50623 の悪用:Clop ランサムウェア・グループの犯行が濃厚 https://t.co/IRuMG9ueHs Cleo の脆弱性 CVE-2024-50623 ですが、第一報は 2024/12/10 の「Cleo 製品群の脆弱性 CVE-2024-50623 の積極的な悪用:Huntress が PoC… https://t.co/I2VDETAHQj

    @iototsecnews

    24 Dec 2024

    88 Impressions

    1 Retweet

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. #WeeklyThreats: CVE-2024-50623 e CVE-2024-55956 di Cleo sfruttate da #TA505, operazioni inedite colpiscono #Kiev, nuovi tool di sorveglianza associati a #Russia e #Cina. L'ultima settimana nel nostro report #OSINT e #CTI 🔗 https://t.co/0Iuo0NeTDA @TelsyGruppoTIM #Intelligence

    @TS_WAY_SRL

    23 Dec 2024

    17 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  7. Cleo の脆弱性 CVE-2024-50623 が標的:洗練された Java バックドアを検出 https://t.co/J7xyWI2yZz Cleo の脆弱性 CVE-2024-50623 ですが、かなりの技術力を持つ脅威アクターが、バックドアを展開しているようです。ご利用のチームは、十分に ご注意ください。 この件に関する第一報は、2024/12/10… https://t.co/PxJaEzIblF

    @iototsecnews

    23 Dec 2024

    98 Impressions

    1 Retweet

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  8. A Clop ransomware banda magára vállalta a felelősséget a Cleot ért adatlopási támadásokért A Clop ransomware banda megerősítette a BleepingComputernek, hogy ők állnak a legutóbbi Cleo adatlopási támadások hátterében, akik a támadások során a CVE-2024-50623 és CVE-2024-55956 el…

    @linuxmint_hun

    21 Dec 2024

    28 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  9. Cleo Harmony, VLTrader, and LexiCom - RCE via Arbitrary File Write (CVE-2024-50623) - watchTowr Labs https://t.co/bbxUV1yJIX

    @_r_netsec

    20 Dec 2024

    793 Impressions

    1 Retweet

    3 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. ICYMI WOTW = Spray Attacks 🚿 🔹 Top threats this week: Mirai Backdoor and REvil Ransomware 🔹 Critical vulnerabilities include CVE-2024-50623 And we share how Gradient Cyber’s MXDR services help stop these attacks before they take hold. Catch up now: https://t.co/KIOt9fuKAK ht

    @GradientCyber

    19 Dec 2024

    18 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  11. برای محصول Cleo آسیب پذیری با کد شناسایی CVE-2024-50623 منتشر شده است . این آسیب پذیری از نوع RCE بوده و به هکرها بدون احراز هویت امکان اجرای کد بر روی سیستم آسیب پذیر را می دهند. این آسیب پذیری در ورژن های قبل از 5.8.0.21 مربوط به این محصول وجود دارد. https://t.co/Poz3aKYxT1 htt

    @AmirHossein_sec

    18 Dec 2024

    32 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  12. CVE-2024-50623 puts #Cleo’s file transfer software at risk. 💻 Learn more in this #CybersecurityThreatAdvisory: https://t.co/8W42axdMlM

    @BarracudaMSP

    17 Dec 2024

    38 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  13. 🚨 CVE-2024-50623: ⚠️ ¡Alerta crítica en Cleo Harmony, VLTrader y LexiCom! 💻 Un atacante no autenticado puede ejecutar comandos Bash o PowerShell arbitrarios en versiones previas a la 5.8.0.24. https://t.co/1FsgOOIDBk

    @tpx_Security

    17 Dec 2024

    147 Impressions

    2 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  14. SFTP Gateway and StorageLink are both secure against the Cleo vulnerability and CVE-2024-50623. A key aspect of CVE-2024-50623 is its exploitation of Cleo’s “autorun” directory, which automatically executes files uploaded to it. Thorn Technologies’ products (SFTP Gateway and…

    @thorntech

    17 Dec 2024

    33 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    1 Reply

    0 Quotes

  15. 🚨 Cyber Threat Neutralized: Cleo Vulnerability CVE-2024-50623 When it comes to cybersecurity, every second counts! 👉 How secure is your business? Don’t wait for a breach—contact Reboot, Inc. to safeguard your IT investments. https://t.co/7nBqtoiNCc #ManagedServices #RebootInc

    @RebootInc

    17 Dec 2024

    25 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  16. #threatreport #LowCompleteness Cleo File Transfer Vulnerabilities (CVE-2024-50623, CVE-2024-55956) - Cl0P s Latest Attack Vector | 16-12-2024 Source: https://t.co/DxVI7lFxpC Key details below ↓ 💀Threats: Clop, Termite, Supply_chain_technique, Malichus, 🎯Victims: Blue yonder…

    @rst_cloud

    17 Dec 2024

    88 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  17. Clop ransomware exploits Cleo Vulnerability in its attacks #ClopRansomware #CVE-2024-50623 #Cleo https://t.co/kTS89IeZsu

    @pravin_karthik

    17 Dec 2024

    32 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  18. Cybersecurity WOTW: Spray Attacks Actively Exploited Vulnerabilities Include: • Cleo File Upload (CVE-2024-50623) • Microsoft CLFS Buffer Overflow (CVE-2024-49138) • Ivanti Connect Secure Command Injection (CVE-2024-21887) 👉Read the blog: https://t.co/mLYWd1ZfIJ https://t.co/

    @GradientCyber

    16 Dec 2024

    56 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  19. The notorious Clop ransomware is back to making headlines, this time targeting Cleo's file transfer platforms. By exploiting a critical zero-day vulnerability (CVE-2024-50623), the group gained unauthorized access to sensitive data. 🔴 CVE-2024-50623 CVSS 8.8 Cleo fixed the… ht

    @cytexsmb

    16 Dec 2024

    351 Impressions

    2 Retweets

    6 Likes

    0 Bookmarks

    0 Replies

    2 Quotes

  20. Clopランサムウェア、Cleo製品のゼロデイ使ったデータ窃取攻撃の実施認める(CVE-2024-50623) https://t.co/4IBRxJYaES #izumino_trend

    @sec_trend

    16 Dec 2024

    44 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  21. Cleo File Transfer Vulnerabilities (CVE-2024-50623, CVE-2024-55956) – Cl0P’s Latest Attack Vector  https://t.co/R7uAQhqQJY Cleo File Transfer Vulnerabilities (CVE-2024-50623, CVE-2024-55956) – Cl0P’s Latest Attack Vector Recently, vulnerabilities in Cleo’s file transfer softw…

    @f1tym1

    16 Dec 2024

    9 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  22. CVE-2024-49138 is getting exploited #inthewild. Find out more at https://t.co/4vzA9Bo0Tc CVE-2024-50623 is getting exploited #inthewild. Find out more at https://t.co/nxYHjmvoLI

    @inthewildio

    16 Dec 2024

    68 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  23. Top 5 Trending CVEs: 1 - CVE-2024-49112 2 - CVE-2024-50623 3 - CVE-2024-53677 4 - CVE-2024-42845 5 - CVE-2024-54143 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W

    @CVEShield

    16 Dec 2024

    32 Impressions

    0 Retweets

    0 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  24. Cleo Unrestricted file upload and download PoC (CVE-2024-50623) https://t.co/4mNjK4Cm41

    @turne85540

    16 Dec 2024

    23 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  25. The recent security advisory from Cleo, CVE-2024-50623, is identified as an unrestricted file upload/download issue that could potentially lead attackers to execute arbitrary code by uploading then downloading files without proper restrictions. 🧵 https://t.co/6UoeiMTihV

    @mcgibson_source

    16 Dec 2024

    29 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  26. ⚠️Clopランサムウェア、Cleo製品のゼロデイ使ったデータ窃取攻撃の実施認める(CVE-2024-50623) 〜サイバーセキュリティ週末の話題〜 https://t.co/MMwIrh6I2q #セキュリティ #インテリジェンス #OSINT

    @MachinaRecord

    16 Dec 2024

    158 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  27. Clopランサムウェア集団がCleo社の各種ファイル転送基盤からのデータ窃取に関して犯行声明。Harmony、VLTrader、LexiCoに影響している。Cleo公式は10月にCVE-2024-50623を修正したが、Huntress社は修正は不十分で迂回可能と指摘。 https://t.co/3w1PN73ByH 政府系や医療系等のデータは消すと、同集団… https://t.co/4C5j7XF5v2

    @__kokumoto

    15 Dec 2024

    397 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  28. Το Clop ransomware αναλαμβάνει την ευθύνη για επιθέσεις κλοπής δεδομένων Cleo Διάβασε το άρθρο Εδώ: https://t.co/cBlgjfVNFF CL0P, CVE-2024-50623, Ransomware, Εκβιασμός, Κλεό, Κλοπ, Κλοπή Δεδομένων https://t.co/Nr9uBkdjYs

    @TechWarGR1

    15 Dec 2024

    54 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  29. I criminali informatici stanno sfruttando una vulnerabilità (CVE-2024-50623) del software Cleo | @CleoNeverStops Maggiori info, qui: 🔗 https://t.co/6XpQCzVVpg Nello screenshot, il comunicato di CL0P uno tra i più noti attori #Ransomware. https://t.co/5BMcvbtCsQ https://t.co/d4Y

    @sonoclaudio

    15 Dec 2024

    324 Impressions

    1 Retweet

    6 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  30. 🚨Following Cleo vulnerability exploitation, the Cl0p ransomware group releases a message. 🚨 After CISA's confirmation that a critical vulnerability (CVE-2024-50623) in Cleo Harmony, VLTrader, and LexiCom file transfer software is being exploited in ransomware attacks, the Cl0p

    @H4ckManac

    15 Dec 2024

    6026 Impressions

    9 Retweets

    21 Likes

    4 Bookmarks

    2 Replies

    0 Quotes

  31. [1day1line] CVE-2024-50623: Arbitrary File Read & Write Vulnerabilities in Cleo's Harmony, LexiCom, VLTrader While handling http requests, data from user was not properly filtered, resulting in path traversal that leads arbitrary file read, write. https://t.co/VTin5GDBi3

    @hackyboiz

    14 Dec 2024

    1109 Impressions

    4 Retweets

    26 Likes

    12 Bookmarks

    0 Replies

    0 Quotes

  32. CISA Adds One Known Exploited Vulnerability to Catalog: CVE-2024-50623 - Cleo Multiple Products Unrestricted File Upload Vulnerability https://t.co/tmCUeW5ek7 https://t.co/H1fcaaw8Hd

    @TMJIntel

    14 Dec 2024

    24 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  33. 🛑 Threat actors are exploiting a critical flaw (CVE-2024-50623) in Cleo’s file transfer tools—even fully patched systems are at risk! 🔎 What’s Happening? ⁃ Over 1,342 Cleo systems are exposed online. ⁃ Attackers use the autorun feature to execute malicious code. ⁃ Victims… htt

    @TheHackersNews

    14 Dec 2024

    10829 Impressions

    17 Retweets

    43 Likes

    6 Bookmarks

    1 Reply

    0 Quotes

  34. Cleo Vulnerability added to CISA KEV Catalog #CLEO #CVE-2024-50623 https://t.co/BiYRpUwLhs

    @pravin_karthik

    14 Dec 2024

    36 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  35. 米国サイバーセキュリティ・社会基盤安全保障庁(CISA)が既知の悪用された脆弱性カタログに、Cleoの複数製品における無制限アップロードの脆弱性CVE-2024-50623を追加。対処期限は通常の1/3。ランサムウェアによる悪用は不知。 https://t.co/GG6EndJgYS

    @__kokumoto

    14 Dec 2024

    696 Impressions

    0 Retweets

    6 Likes

    2 Bookmarks

    1 Reply

    0 Quotes

  36. Latest Known Exploited Vulnerabilities (#KEV) : #CVE-2024-50623 #Cleo Multiple Products Unrestricted File Upload Vulnerability https://t.co/fpWVVPFc5t

    @ScyScan

    13 Dec 2024

    34 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  37. 🚨 CVE-2024-50623: Cleo Vulnerability Alert 🚨 Cleo’s platform supports 4,000+ organizations, and this critical vulnerability is being actively exploited. Discover steps to prioritize, mitigate, and defend: https://t.co/CF7wjIy8o9 #Cybersecurity #CVE202450623 #ThreatResponse ht

    @Averlon_ai

    13 Dec 2024

    4 Impressions

    1 Retweet

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  38. 🛡️ We added a Cleo unrestricted file upload vulnerability, CVE-2024-50623, affecting multiple products to our Known Exploited Vulnerabilities Catalog. Visit https://t.co/myxOwap1Tf & apply mitigations to protect your org from cyberattacks. #Cybersecurity #InfoSec https://t.c

    @CISACyber

    13 Dec 2024

    4480 Impressions

    17 Retweets

    32 Likes

    1 Bookmark

    0 Replies

    1 Quote

  39. 🚨 CVE-2024-50623: Cleo Harmony, VLTrader, LexiCom 💥 RCE via Arbitrary File Write 💥 📸 Exploited during PoC—2K+ services at risk! ⚠️ Affected: Versions > 5.8.0.21 ⬆️ Update now to stay safe. 🔗 Details & PoC: https://t.co/iGksI99QOR https://t.co/T5tof9bDqF

    @0xgh057r3c0n

    13 Dec 2024

    78 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  40. CVE-2024-50623 puts #Cleo’s file transfer software at risk. 💻 Learn more in this #CybersecurityThreatAdvisory: https://t.co/8W42axdMlM

    @BarracudaMSP

    13 Dec 2024

    60 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  41. CVE-2024-50623 puts #Cleo’s file transfer software at risk. 💻 Learn more in this #CybersecurityThreatAdvisory: https://t.co/o8EGRcTAGY

    @SmarterMSP

    12 Dec 2024

    46 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  42. Ransomware Hackers Exploiting Cleo’s LexiCom, VLTransfer and Harmony software products. File transfer software made by Cleo Communications is under active attack and a patch meant to stymie hackers doesn't fix the flaw tracked as CVE-2024-50623. https://t.co/TeVFTxFESf https://t.

    @riskigy

    12 Dec 2024

    49 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  43. CVE-2024-50623: Cleo Unrestricted file upload and download #poc From https[:]//github.com/watchtowrlabs/CVE-2024-50623 https[:]//labs.watchtowr.com/cleo-cve-2024-50623/ #CVC https://t.co/4yUMb7jOqO

    @sirifu4k1

    12 Dec 2024

    397 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  44. Malichus Malware Exploiting Cleo 0-day Vulnerability In Wild https://t.co/ABqCNcLpsa Threat actors are actively exploiting a critical zero-day vulnerability (CVE-2024-50623) in Cleo’s file transfer products Harmony, VLTrader, and LexiComis. #cybersecurity #vulnerability

    @gbhackers_news

    12 Dec 2024

    112 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  45. GitHub - watchtowrlabs/CVE-2024-50623: Cleo Unrestricted file upload and download PoC (CVE-2024-50623) - https://t.co/sq8WKuJo6C

    @piedpiper1616

    12 Dec 2024

    956 Impressions

    5 Retweets

    16 Likes

    5 Bookmarks

    0 Replies

    0 Quotes

  46. At first glance -- only just testing our PoC, not analyzing the code for their patch yet.. ✅ the new 5.8.0.24 patch version for Cleo software Harmony/VLTrader/LexiCom DOES look to be effective at preventing our @HuntressLabs proof-of-concept exploit. (0-day, not CVE-2024-50623) h

    @_JohnHammond

    12 Dec 2024

    19212 Impressions

    26 Retweets

    124 Likes

    32 Bookmarks

    3 Replies

    0 Quotes

  47. Cleo Harmony, VLTrader, and LexiCom - RCE via Arbitrary File Write (CVE-2024-50623) - watchTowr Labs https://t.co/fQvEg61gml https://t.co/Pqbj7ElUnF

    @secharvesterx

    11 Dec 2024

    71 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  48. 🚨 Tracking Cleo Software - CVE-2024-50623 🚨 We’ve just tagged content in @splunk #SecurityContent to help identify activity exploiting the Cleo software vulnerability. Why does this matter? ➡️ Cleo file transfer software is actively being targeted in the wild. ➡️… https://t

    @M_haggis

    11 Dec 2024

    10 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  49. Attackers are actively exploiting CVE-2024-50623 to gain remote code execution (RCE) on affected #Cleo servers. It was initially thought that the patch was insufficient due to ongoing exploitation, but it turns out there is a second RCE. More info: https://t.co/YQw2idfJka https

    @intruder_io

    11 Dec 2024

    52 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  50. You knew it was coming… Cleo Harmony, VLTrader, and LexiCom - RCE via Arbitrary File Write (CVE-2024-50623) https://t.co/1ArKtvdV9o

    @watchtowrcyber

    11 Dec 2024

    8078 Impressions

    40 Retweets

    94 Likes

    26 Bookmarks

    2 Replies

    1 Quote

Configurations