Security

Patches

Three-year-old Apache Flink flaw under active attack

We know IT admins have busy schedules but c'mon


An improper access control bug in Apache Flink that was fixed in January 2021 has been added to the US government's Known Exploited Vulnerabilities Catalog, meaning criminals are right now abusing the flaw in the wild to compromise targets.

Plus, its inclusion in the catalog means federal agencies need to either close the hole in their deployments of the software or stop using the tool altogether by June 13. Everyone else should make sure they are patched, too.

Everyone should also check to see if they've been compromised via the vulnerability, if possible. Though it's known now that the bug is being exploited in the wild, it may have been abused earlier.

Flink is an open source, stream- and batch-processing framework maintained by the Apache Software Foundation. This particular bug, tracked as CVE-2020-17519, could allow snoops to gain access to sensitive data.

"A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process," Flink project maintainer Robert Metzger noted just over three years ago. 

Apache addressed the issue with versions 1.11.3 and 1.12.0. Shortly after, security researchers published exploit code. And now, here we are in May 2024 with federal agencies and other organizations still using insecure versions and criminals circling the CVE.

Uncle Sam's Cybersecurity and Infrastructure Security Agency (CISA), which added CVE-2020-17519 to the government's Known Exploited Vulnerabilities catalog on Thursday, doesn't provide much detail. While the database does note if a particular bug that's under exploit is known to be used in ransomware campaigns, this flaw's status is currently listed as "unknown." We don't know who is abusing the bug at this point, nor for what nefarious purposes.

As with all bugs added to the catalog, the Homeland Security agency warns: "These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise."

Plus, as The Reg would like to humbly point out: CVE-2020-17519 illustrates the importance of patching installations, or at least having good software inventory databases. See the 2020 in the name? That's when it was spotted and disclosed to the Flink maintainers by a helpful researcher who goes by 0rich1 from Ant Security FG Lab.

But simply fixing flaws in newer versions of software, open- and closed-source alike, does no good if users don't upgrade or update – or don't know they need to update. This brings us to where we are today, with government agencies and bug hunters screaming into the wind about writing secure code and applying patches in a timely manner.

That crooks are exploiting known holes isn't surprising; it would be worthwhile instead at this stage to focus on what's holding back patching, and what can be done to automate or ease it. ®

Send us news
11 Comments

Mitel 0-day, 5-year-old Oracle RCE bug under active exploit

3 CVEs added to CISA's catalog

GoDaddy slapped with wet lettuce for years of lax security and 'several major breaches'

Watchdog alleged it had no SIEM or MFA, orders rapid adoption of basic infosec tools

Biden signs sweeping cybersecurity order, just in time for Trump to gut it

Ransomware, AI, secure software, digital IDs – there's something for everyone in the presidential directive

Microsoft eggheads say AI can never be made secure – after testing Redmond's own products

If you want a picture of the future, imagine your infosec team stamping on software forever

Miscreants 'mass exploited' Fortinet firewalls, 'highly probable' zero-day used

Ransomware 'not off the table,' Arctic Wolf threat hunter tells El Reg

CISA: Wow, that election had a lot of foreign trolling. Trump's Homeland Sec pick: And that's none of your concern

Cyber agency too 'far off mission,' says incoming boss Kristi Noem

Look for the label: White House rolls out 'Cyber Trust Mark' for smart devices

Beware the IoT that doesn’t get a security tag

Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

'Codefinger' crims on the hunt for compromised keys

After China's Salt Typhoon, the reconstruction starts now

If 40 years of faulty building gets blown down, don’t rebuild with the rubble

FCC to telcos: By law you must secure your networks from foreign spies. Get on it

Plus: Uncle Sam is cross with this one Chinese biz over Salt Typhoon mega-snooping

Just as your LLM once again goes off the rails, Cisco, Nvidia are at the door smiling

Some of you have apparently already botched chatbots or allowed ‘shadow AI’ to creep in

Database tables of student, teacher info stolen from PowerSchool in cyberattack

Class act: Cloud biz only serves 60M-plus folks globally, no biggie