Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
overview
The PHP Group has patched a significant vulnerability affecting all versions of PHP on Windows systems, tracked as CVE-2024-4577 (CVSS 9.8). This flaw allows attackers to execute arbitrary code – making systems using the PHP language at risk, especially those running the XAMPP development environment.
The vulnerability stems from an argument injection bug resulting from an incomplete fix for a previous issue found in 2012 (CVE-2012-1823). While implementing PHP, the development team overlooked the Best-Fit feature of encoding conversion within the Windows operating system. This oversight allows unauthenticated attackers to bypass prior protections by using specific character sequences. As a result, they can execute arbitrary code on remote PHP servers through argument injection attacks.
Researchers from Devcore, who discovered the vulnerability, highlighted its ease of exploitation. Attackers can exploit vulnerable PHP installations running in CGI mode by mapping HTTP requests to a PHP-CGI executable in the Apache HTTP Server, a common configuration that increases the attack surface.
The flaw also affects systems where the PHP binary is exposed in the CGI directory, the default mode for XAMPP. XAMPP has not yet released an update, leaving many environments at risk. Currently, the flaw is being abused in multiple malware campaigns, including those involving Gh0st RAT, RedTail Cryptominer, Muhstik malware, and XMRig.
Please be advised that CVE-2024-4577 is being exploited by attackers and multiple exploit attempts have been detected within 24 hours of disclosure. This vulnerability impacts all versions of PHP on Windows and should be patched IMMEDIATELY.
IOCs ADDED TO OUR THREAT FEEDS
We have not discovered any IoC’s specifically related to exploitation of CVE-2024-4577 however, we are aware of 4 malware campaigns that have actively exploited this vulnerability: Gh0stRat, RedTail Cryptominer, XMRig, and Mustik. Avertium is monitoring for over 10,000 individual IoC’s related to these campaigns.
NOTE!: Avertium is actively searching across all monitored environments for the IoC’s listed below. If any are discovered, we will reach out to you directly. If your environment or portions of your environment are not currently being monitored, please reach out to your Service Delivery Manager.
TTPs TO MONITOR
If you have any questions on these findings or prefer to no longer be notified about this issue, please contact the Cyber Fusion Center by replying to this message, sending an email to cfc@avertium.com, or by calling 1-877-707-7997 (option 1).
SUPPORTING DOCUMENTATION