Skip to content

JetBrains TeamCity Vulnerability Added to CISAs Known Exploited Catalog - 20240305003

Overview

JetBrains has released a security update that addresses vulnerabilities in its TeamCity on-premises server. The TeamCity tool manages the software development CI/CD pipeline, which is the process by which code is built, tested, and deployed. This vulnerabilities could allow threat actors to bypass authentication and gain admin control of the victim's TeamCity server.

What is vulnerable?

Product(s) Affected Summary CVE Severity CVSS Exploited Dated
TeamCity versions before 2023.11.4 authentication bypass allowing to perform admin actions was possible CVE-2024-27198
CWE-288
Critical N/A (Nist)
9.8 (JetBrains s.r.o)
Yes 07 Mar, 2024
TeamCity versions before 2023.11.4 path traversal allowing to perform limited admin actions was possible CVE-2024-27199
CWE-23
High N/A (Nist)
7.3 (JetBrains s.r.o)
Yes 07 Mar, 2024

What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of 48 hours (refer Patch Management):

Additional References