1,400 GitLab Servers Impacted by Exploited Vulnerability
1,400 GitLab Servers Impacted by Exploited Vulnerability
1,400 GitLab Servers Impacted by Exploited Vulnerability
Sara Gilbert, Ph. D.
May 9, 2024
Recently, there was a critical vulnerability in GitLab servers that allowed attackers to take over accounts by sending password reset emails to unverified addresses. This has affected multiple versions of GitLab – and although patches were released in January 2024, there was evidence that attackers were actively exploiting these vulnerabilities.
“GitLab patched the security defect in January 2024, warning that GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.1 to 16.7.1 are affected. Fixes were included in GitLab versions 16.5.6, 16.6.4, and 16.7.2 and backported to versions 16.1.6, 16.2.9, 16.3.7, and 16.4.5. GitLab said at the time that it had not observed in-the-wild exploitation of CVE-2023-7028, but CISA on Wednesday added the bug to its Known Exploited Vulnerabilities (KEV) Catalog, saying it has evidence of active exploitation. SecurityWeek has not seen other reports of CVE-2023-7028 being targeted in attacks.”
Fr0ntierX offers cybersecurity and access management solutions by utilizing artificial intelligence to secure and protect sensitive data throughout its lifecycle. Our comprehensive and multilayered approach prioritizes user privacy while continuing to provide granular-level insights and analytics for strategic decision making. With features including multifactor authentication, advanced encryption, biometrics, and more, Fr0ntierX ensures actionable insights without ever compromising personal information and data security.
Recently, there was a critical vulnerability in GitLab servers that allowed attackers to take over accounts by sending password reset emails to unverified addresses. This has affected multiple versions of GitLab – and although patches were released in January 2024, there was evidence that attackers were actively exploiting these vulnerabilities.
“GitLab patched the security defect in January 2024, warning that GitLab Community Edition (CE) and Enterprise Edition (EE) versions 16.1 to 16.7.1 are affected. Fixes were included in GitLab versions 16.5.6, 16.6.4, and 16.7.2 and backported to versions 16.1.6, 16.2.9, 16.3.7, and 16.4.5. GitLab said at the time that it had not observed in-the-wild exploitation of CVE-2023-7028, but CISA on Wednesday added the bug to its Known Exploited Vulnerabilities (KEV) Catalog, saying it has evidence of active exploitation. SecurityWeek has not seen other reports of CVE-2023-7028 being targeted in attacks.”
Fr0ntierX offers cybersecurity and access management solutions by utilizing artificial intelligence to secure and protect sensitive data throughout its lifecycle. Our comprehensive and multilayered approach prioritizes user privacy while continuing to provide granular-level insights and analytics for strategic decision making. With features including multifactor authentication, advanced encryption, biometrics, and more, Fr0ntierX ensures actionable insights without ever compromising personal information and data security.
Cybersecurity
Access Management
Artificial Intelligence
Data Protection
User Privacy
Data Analytics
Decision Making
Artificial Intelligence
Data Protection
User Privacy
Data Analytics
Decision Making
Multifactor Authentication
Decision Making
Encryption
Multifactor Authentication
Encryption
Biometrics
Actionable Insights
Fr0ntierX
Multifactor Authentication
Actionable Insights
Fr0ntierX
© 2024 Fr0ntierX Inc. All rights reserved. Janus, Polaris, and the Janus and Polaris logos are trademarks of Fr0ntierX Inc.
© 2024 Fr0ntierX Inc. All rights reserved. Janus, Polaris, and the Janus and Polaris logos are trademarks of Fr0ntierX Inc.
© 2024 Fr0ntierX Inc. All rights reserved. Janus, Polaris, and the Janus and Polaris logos are trademarks of Fr0ntierX Inc.