A critical vulnerability, identified as CVE-2024-27198, has been discovered in JetBrains’ TeamCity On-Premises CI/CD solution, posing a significant security threat that allows remote unauthenticated attackers to gain administrative control of the server. Here’s what you need to know.
JetBrains is a company that creates tools for software developers and project managers. This vulnerability, alongside a less severe issue (CVE-2024-27199) that permits the modification of certain system settings without authentication, affects all versions of TeamCity’s on-premise installations (2023.11.3 and earlier).
The critical flaw was identified by security researchers, who have also provided a proof of concept demonstrating the ease with which attackers can exploit this vulnerability to execute remote code and potentially conduct supply chain attacks. JetBrains has released an update to fix these vulnerabilities (2023.11.4), urging administrators of TeamCity On-Premises installations to apply the update as soon as possible.
Other vulnerabilities affecting JetBrains’ TeamCity, such as CVE-2023-42793, have been heavily abused by threat actors, and the newly announced vulnerabilities will likely be targeted quickly. The severity of this vulnerability cannot be overstated, as it grants attackers the ability to take complete control of the affected server, potentially compromising the entire CI/CD pipeline and the software development process.
Nuspire is proactively addressing the critical vulnerability in JetBrains’ TeamCity. The company applies patches in accordance with vendor recommendations and actively threat hunts client environments for indications of compromise.
For organizations utilizing TeamCity On-Premises, it’s crucial to take immediate action to mitigate these security risks:
In addition to these immediate actions, organizations should also review their overall security posture and ensure that they have comprehensive security measures in place to detect and respond to potential threats. This may include implementing multi-factor authentication, regularly monitoring for suspicious activity and providing security awareness training to employees. By taking a proactive approach to security and staying informed about the latest threats and vulnerabilities, organizations can minimize the risk of successful attacks and protect their valuable assets and data.