Overview
A critical vulnerability in cPanel and WebHost Manager (WHM) is being exploited by hackers to gain control of thousands of websites. The bug, tracked as CVE-2023-26073, allows attackers to take full control of and hijack vulnerable servers via their control panels using a simple PHP deserialization attack.
What it does
The vulnerability enables hackers to deploy malicious payloads and gain root access to affected servers. As of Monday, there are over 550,000 potentially vulnerable servers running cPanel, with around 2,000 instances likely compromised. The extent of the damage is visible, with Google indexing dozens of websites that displayed a message from a group of hackers claiming to have encrypted the victim's files in an apparent ransomware attack.
Tradeoffs
The ongoing exploitation of the cPanel bug highlights the urgent need for patching and secure configuration of the affected software. Remediation efforts are underway, but the clock is ticking. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned that the vulnerability was being exploited in the wild and added it to its Known Exploited Vulnerabilities (KEV) catalog, asking government agencies to patch by Sunday.
In practical terms, website administrators using cPanel and WHM should prioritize patching their systems to prevent exploitation. This involves updating to the latest version of cPanel and WHM, as well as ensuring that all plugins and themes are up-to-date. Additionally, administrators should monitor their systems for suspicious activity and implement robust security measures, such as two-factor authentication and regular backups.
The situation underscores the ongoing struggle to keep pace with the evolving threat landscape. As hackers continue to target and compromise websites, it is essential for administrators to stay vigilant and take proactive steps to secure their systems.
In conclusion, the cPanel bug poses a significant risk to thousands of websites, and immediate action is necessary to prevent further exploitation. By prioritizing patching and secure configuration, website administrators can help protect their systems and prevent malicious activity.