Created on 2024-12-15 10:09 and updated on 2024-12-15 14:36.

Description

Cleo Product Security Update - CVE-2024-55956

Patch Version 5.8.0.24 Made Available to Address Previously Reported Critical Vulnerability (CVE-2024-55956) Cleo strongly advises all customers to immediately upgrade instances of Harmony, VLTrader, and LexiCom to the latest released patch (version 5.8.0.24) to address this vulnerability.

The vulnerability affects only the following products:

  • Cleo Harmony® (prior to version 5.8.0.24)
  • Cleo VLTrader® (prior to version 5.8.0.24)
  • Cleo LexiCom® (prior to version 5.8.0.24)

This security patch (version 5.8.0.24) addresses the previously identified critical vulnerability (CVE-2024-55956)) in Cleo Harmony, VLTrader, and LexiCom that could allow an unauthenticated user to import and execute arbitrary bash or PowerShell commands on the host system by leveraging the default settings of the Autorun directory.

Please visit Unauthenticated Malicious Hosts Vulnerability to take immediate action..

Cleo Product Security Advisory - CVE-2024-50623

Cleo has identified an unrestricted file upload and download vulnerability (CVE-2024-50623) that could lead to remote code execution.

The vulnerability affects the following products:

  • Cleo Harmony® (prior to version 5.8.0.21)
  • Cleo VLTrader® (prior to version 5.8.0.21)
  • Cleo LexiCom® (prior to version 5.8.0.21)

Cleo strongly advises all customers to immediately upgrade instances of Harmony, VLTrader, and LexiCom to the latest released patch (version 5.8.0.21) to address additional discovered potential attack vectors of the vulnerability. 

Please visit Unrestricted File Upload and Download Vulnerability Mitigation to take immediate action.

Unfortunately some of the links are restricted to customers having a support contact.

CVE-2024-12632 is now rejected and a duplicate of CVE-2024-55956.

Vulnerabilities included in this bundle

Author

Alexandre Dulaunoy

Combined sightings

Author Vulnerability Source Type Date
automationCVE-2024-55956https://bsky.app/profile/hackingne.ws/post/3lkntltqrh62pseen14 days ago
automationCVE-2024-55956MISP/a1e796df-2ad8-4c8d-8b69-737a004e72ddseen1 month ago
automationCVE-2024-55956MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123seen1 month ago
automationCVE-2024-55956MISP/a1e796df-2ad8-4c8d-8b69-737a004e72ddseen1 month ago
automationCVE-2024-55956https://infosec.exchange/users/screaminggoat/statuses/113867636525001029seen2 months ago
automationCVE-2024-55956https://bsky.app/profile/rajsamani.bsky.social/post/3lgaqupqg4c2hseen2 months ago
automationCVE-2024-55956https://bsky.app/profile/beikokucyber.bsky.social/post/3lfvavuyhmc27seen2 months ago
automationCVE-2024-55956https://bsky.app/profile/stephenfewer.bsky.social/post/3lf6jv7gjrc26seen2 months ago
automationCVE-2024-55956https://bsky.app/profile/bluecyber.bsky.social/post/3ldrtcuxj5s26seen3 months ago
automationCVE-2024-55956https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2024/CVE-2024-55956.yamlconfirmed3 months ago
automationCVE-2024-55956MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123seen3 months ago
automationCVE-2024-55956https://feedsin.space/feed/CISAKevBot/items/2919426seen3 months ago
automationCVE-2024-55956https://infosec.exchange/users/screaminggoat/statuses/113668907290703264seen3 months ago
automationCVE-2024-55956https://infosec.exchange/users/edwardk/statuses/113663744872730791seen3 months ago
automationCVE-2024-55956MISP/ca790929-8e78-455e-903d-a68231af7b9cseen3 months ago
automationCVE-2024-55956https://infosec.exchange/users/catc0n/statuses/113662633470258921seen3 months ago
automationCVE-2024-55956https://infosec.exchange/users/shadowserver/statuses/113656947909919073seen3 months ago
automationCVE-2024-55956https://social.circl.lu/users/vulnerability_lookup/statuses/113656290741715294seen3 months ago
automationCVE-2024-55956https://infosec.exchange/users/catc0n/statuses/113647607008214402seen3 months ago
automationCVE-2024-12632https://infosec.exchange/users/shadowserver/statuses/113656947909919073seen3 months ago
automationCVE-2024-12632https://infosec.exchange/users/catc0n/statuses/113647513738605389seen3 months ago