Ethical Hacking News
A "coordinated surge" in Server-Side Request Forgery (SSRF) vulnerability exploitation has left multiple platforms and countries vulnerable to attack. Learn more about this emerging threat and how organizations can protect themselves against potential security breaches.
GreyNoise has detected a "coordinated surge" in Server-Side Request Forgery (SSRF) vulnerability exploitation, leaving multiple platforms and countries vulnerable to attack. The exploitation of these vulnerabilities can lead to various types of attacks, including mapping internal networks, locating vulnerable services, and stealing cloud credentials. GreyNoise observed the activity on March 9, 2025, with notable attempts also seen on March 11, 2025, targeting several countries. The SSRF vulnerabilities being exploited include multiple CVEs, including those for DotNetNuke, Zimbra Collaboration Suite, VMware vCenter, and GitLab CE/EE. Many of the same IP addresses are targeting multiple SSRF flaws at once, suggesting a pattern of structured exploitation, automation, or pre-compromise intelligence gathering. Organizations and individuals must prioritize their cybersecurity posture by applying latest patches, limiting outbound connections, monitoring for suspicious requests, and conducting regular vulnerability assessments.
Threat intelligence firm GreyNoise has sounded the alarm on a "coordinated surge" in the exploitation of Server-Side Request Forgery (SSRF) vulnerabilities, leaving multiple platforms and countries vulnerable to attack. According to GreyNoise, at least 400 IP addresses have been seen actively exploiting multiple SSRF CVEs simultaneously, with notable overlap between attack attempts.
This coordinated surge has sparked concerns among security experts and organizations worldwide, as the exploitation of these vulnerabilities can lead to various types of attacks, including mapping internal networks, locating vulnerable services, and stealing cloud credentials. Moreover, many modern cloud services rely on internal metadata APIs, which SSRF can access if exploited, making it a significant threat.
GreyNoise observed the activity on March 9, 2025, with notable attempts also seen on March 11, 2025, targeting countries such as Israel, the United States, Germany, Singapore, India, Lithuania, and Japan. The list of SSRF vulnerabilities being exploited includes:
* CVE-2017-0929 (CVSS score: 7.5) - DotNetNuke
* CVE-2020-7796 (CVSS score: 9.8) - Zimbra Collaboration Suite
* CVE-2021-21973 (CVSS score: 5.3) - VMware vCenter
* CVE-2021-22054 (CVSS score: 7.5) - VMware Workspace ONE UEM
* CVE-2021-22175 (CVSS score: 9.8) - GitLab CE/EE
* CVE-2021-22214 (CVSS score: 8.6) - GitLab CE/EE
* CVE-2021-39935 (CVSS score: 7.5) - GitLab CE/EE
* CVE-2023-5830 (CVSS score: 9.8) - ColumbiaSoft DocumentLocator
* CVE-2024-6587 (CVSS score: 7.5) - BerriAI LiteLLM
* CVE-2024-21893 (CVSS score: 8.2) - Ivanti Connect Secure
GreyNoise noted that many of the same IP addresses are targeting multiple SSRF flaws at once rather than focusing on one particular weakness, suggesting a pattern of structured exploitation, automation, or pre-compromise intelligence gathering.
In light of this coordinated surge in SSRF vulnerability exploitation, it is essential that users apply the latest patches and limit outbound connections to necessary endpoints. Moreover, monitoring for suspicious outbound requests can help identify potential security breaches early on. As GreyNoise pointed out, "SSRF can be used to map internal networks, locate vulnerable services, and steal cloud credentials."
The implications of this coordinated surge in SSRF vulnerability exploitation are far-reaching, highlighting the need for organizations and individuals to prioritize their cybersecurity posture. With the rise of cloud computing and increased reliance on internal metadata APIs, the risk of SSRF-based attacks has become more significant.
In response to this emerging threat, security experts recommend implementing best practices, such as:
* Applying the latest patches and updates
* Limiting outbound connections to necessary endpoints
* Monitoring for suspicious outbound requests
* Conducting regular vulnerability assessments and penetration testing
By taking proactive steps to address these vulnerabilities, organizations can minimize their exposure to SSRF-based attacks and protect themselves against potential security breaches.
In conclusion, the coordinated surge of SSRF vulnerability exploitation is a pressing concern that demands immediate attention from organizations and individuals alike. By understanding the nature of this threat and implementing effective cybersecurity measures, we can mitigate the risks associated with SSRF vulnerabilities and maintain the integrity of our digital assets.
Related Information:
https://www.ethicalhackingnews.com/articles/The-Coordinated-Surge-of-SSRF-Vulnerability-Exploitation-A-Threat-to-Global-Security-ehn.shtml
https://thehackernews.com/2025/03/over-400-ips-exploiting-multiple-ssrf.html
https://cybersecuritynews.com/400-ips-actively-exploiting-multiple-ssrf-vulnerabilities/
https://nvd.nist.gov/vuln/detail/CVE-2017-0929
https://www.cvedetails.com/cve/CVE-2017-0929/
https://nvd.nist.gov/vuln/detail/CVE-2020-7796
https://www.cvedetails.com/cve/CVE-2020-7796/
https://nvd.nist.gov/vuln/detail/CVE-2021-21973
https://www.cvedetails.com/cve/CVE-2021-21973/
https://nvd.nist.gov/vuln/detail/CVE-2021-22054
https://www.cvedetails.com/cve/CVE-2021-22054/
https://nvd.nist.gov/vuln/detail/CVE-2021-22175
https://www.cvedetails.com/cve/CVE-2021-22175/
https://nvd.nist.gov/vuln/detail/CVE-2021-22214
https://www.cvedetails.com/cve/CVE-2021-22214/
https://nvd.nist.gov/vuln/detail/CVE-2021-39935
https://www.cvedetails.com/cve/CVE-2021-39935/
https://nvd.nist.gov/vuln/detail/CVE-2023-5830
https://www.cvedetails.com/cve/CVE-2023-5830/
https://nvd.nist.gov/vuln/detail/CVE-2024-6587
https://www.cvedetails.com/cve/CVE-2024-6587/
https://nvd.nist.gov/vuln/detail/CVE-2024-21893
https://www.cvedetails.com/cve/CVE-2024-21893/
Published: Wed Mar 12 17:22:37 2025 by llama3.2 3B Q4_K_M