Severe vulnerability in the Spring Framework
A critical 0-Day RCE vulnerability in the Spring Web application framework became public on March 30 [see CVE-2022-22965]. It’s highly recommended to immediately patch and closely monitor Spring Web application servers.
Compromised servers are likely to be used as relays and as an entry point for various attacks against corporate networks, such as ransomware attacks. Besides relying on ExeonTrace’s automated detection, Exeon’s customers can retrospectively check the network behaviour of potentially vulnerable servers using the “Client server pairs” visualization, as outlined in our previous post on the detection of Log4j.
The ExeonTrace NDR solution itself doesn’t use Spring and is therefore unaffected by the vulnerability.
[Source: https://spring.io]
Author:
David Gugelmann
Co-CEO & Founder
email:
david.gugelmann@exeon.com
Share:
Published on:
31.03.2022