Attackers exploit zero-day vulnerability in Atlassian Confluence for remote code execution 

SECURITY INSIGHTS | 3. June 2022


Cybercriminals are currently exploiting a critical vulnerability in Confluence Server and Data Center to execute malicious code on enterprise servers. Myra is providing customers with a new ruleset for Hyperscale WAF to proactively mitigate the threat.

Update as of June 4, 2022:

Atlassian has since provided patched versions of the affected products. With the Myra Hyperscale WAF, you protect your systems until the changeover to these versions has taken place. This will ensure you have the time you need for patch management.

Original announcement from June 3, 2022

A critical vulnerability (CVE-2022-26134) is currently threatening many organizations' Confluence servers. The still unpatched vulnerability allows attackers to execute remote code via the software of the manufacturer Atlassian. According to Atlassian, all supported versions of Confluence Server and Confluence Data Center are affected. Further information about the vulnerability is currently not known.

Confluence Zero-Day: proactive protection with Myra Hyperscale WAF.

Until the first security updates and workarounds for the vulnerability are available, organizations can protect themselves from attacks with Myra Hyperscale WAF and a ruleset developed specifically for the threat. Additionally, Myra can further shrink the attack surface with granular IP whitelisting and blacklisting to best minimize risk.

Contact us now. Our team of cybersecurity experts will determine your individual protection needs and explain to you at eye level how you can best protect yourself against such threats.

Related articles