25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Critical Cleo File-Transfer Flaw Under Active Exploitation; Cl0p Claims Responsibility

A critical flaw in Cleo file-transfer software is being actively exploited by threat actors. The vulnerability is believed to be a previously patched flaw, CVE-2024-50623, which allows unrestricted file uploads and downloads, including dangerous file types. Successful exploitation of the vulnerability can lead to remote code execution.

The vulnerability affects the following Celo products:

  • Cleo Harmony before 5.8.0.21
  • Cleo VLTrader before 5.8.0.21
  • Cleo LexiCom before 5.8.0.21

Cleo issued a patch to fix the vulnerability in October; however, the patch does not provide full protection against exploitation. Researchers at Huntress have observed mass exploitation and post-exploitation activity in patched and unpatched versions of the affected products since December 3, 2024. An analysis of the attacks allowed Huntress to develop a proof-of-concept exploit for the flaw, and while they believe threat actor activity uses the same method to exploit the flaw, they do not have full details of the vulnerability so they could not confirm whether that was the case. It is possible that threat actors are using a different attack vector. Researchers at Rapid7 confirmed they had seen successful exploitation of the flaw in customer environments.

According to Huntress, companies compromised via this vulnerability have mostly been in the consumer products, food, shipping, and trucking sectors. After sharing their findings with Cleo, Huntress said it would issue a new CVE and expects to issue a patch to fix the issue this week. On December 10, 2024, Cleo alerted customers that a critical vulnerability existed that allowed unauthenticated attackers to import and execute arbitrary bash and PowerShell commands by leveraging the default settings of the Autorun directors.

Get The FREE
HIPAA Compliance Checklist

Immediate Delivery of Checklist Link To Your Email Address

Please Enter Correct Email Address

Your Privacy Respected

HIPAA Journal Privacy Policy

Until the patch is issued and applied, all users of the affected products should disconnect them from the public Internet and search for the Indicators of Compromise (IoCs) shared by Huntress to determine if the flaw has already been exploited. The threat actor behind the attacks has not been identified. While the Clop cybercrime group has form in this area, having exploited zero-day vulnerabilities in the Accellion FTA, Fortra’s GoAnywhere, and Progress Software’s MOVEit file transfer solutions, security researcher Kevin Beaumont suggests the Termite ransomware group may be behind the attacks, and claims they have a working exploit for the vulnerability.

Update: December 12, 2024: Cleo Releases Patches

“Cleo strongly advises all customers to immediately upgrade instances of Harmony, VLTrader, and LexiCom to the latest released patch (version 5.8.0.24) to address additional discovered potential attack vectors of the vulnerability,” explained Cleo in its security update. “After applying the patch, errors are logged for any files found at startup related to this exploit, and those files are removed.”

Update: December 16, 2024: Clop Threat Group Claims Responsibility for Exploitation

The Clop threat group, aka Cl0p, has claimed responsibility for the initial exploit and the bypass identified by Huntress. The Clop group also claimed that if it detected data theft from government services, institutions, or medicine the data would be deleted without hesitation.

Due to recent events (attack of CLEO) all links to data of all companies will be disabled and data will be permanently deleted from servers,” said the Clop group in a post on its leak site. “We will work only with new companies. Happy New Year © CL0P^_.”  The post suggests the data stolen in its previous mass attack, which exploited a zero-day vulnerability in Progress Software’s MOVEit solution in late May 2023, will be deleted.

Author: Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist