CISA Urges Quick Action to Patch Critical Sitecore Vulnerability Being Actively Exploited

Published:

spot_img

Urgent Advisory: Sitecore Vulnerability Requires Immediate Attention

Introduction to the Vulnerability

Agencies within the Federal Civilian Executive Branch (FCEB) have been urged to update their Sitecore systems by September 25, 2025, in light of a significant security flaw currently being exploited. This vulnerability, identified as CVE-2025-53690, has received a critical CVSS score of 9.0 out of 10, indicating its severity.

Nature of the Vulnerability

According to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the flaw resides in several Sitecore products, including Sitecore Experience Manager (XM), Experience Platform (XP), Experience Commerce (XC), and Managed Cloud. Specifically, it involves the deserialization of untrusted data linked to default machine keys. This makes it possible for attackers to leverage exposed ASP.NET machine keys to execute remote code.

Discovery and Attack Patterns

The security risk was first identified by Mandiant, a Google-owned cybersecurity firm, which uncovered an active ViewState deserialization attack capitalizing on a machine key publicly available in Sitecore deployment manuals from 2017 and earlier. This activity does not appear to be tied to any known threat actor or group.

Mandiant’s researchers noted that the attackers demonstrated a sophisticated understanding of the compromised system, seamlessly transitioning from initial infiltration to escalating privileges within the network.

Historical Context of Exploitation

Microsoft first reported the misuse of publicly disclosed ASP.NET machine keys in February 2025, observing limited exploitation attempts dating back to December 2024. Attackers used these keys to deploy the Godzilla post-exploitation framework. Furthermore, in May 2025, an improper authentication issue affecting ScreenConnect (CVE-2025-3935) was found to be exploited by a state-sponsored actor employing ViewState code injection attacks targeted at select customers.

Current Threat Landscape

As recently as July, an Initial Access Broker (IAB) named Gold Melody was linked to campaigns targeting leaked ASP.NET machine keys, allowing unauthorized access that was later sold to other cybercriminals. Mandiant has documented that CVE-2025-53690 can be weaponized to infiltrate internet-facing Sitecore instances, leading to the use of various tools for reconnaissance, remote access, and Active Directory exploration.

The malware engaged in these attacks included a .NET assembly known as WEEPSTEEL, which not only gathers system, network, and user data but also facilitates data exfiltration to attackers.

Tools and Methods in Use

The attackers established footholds and escalated privileges efficiently using a combination of tools designed for network tunneling and reconnaissance. Key tools included:

  • EarthWorm: Used for network tunneling with SOCKS.
  • DWAgent: For persistent remote access and Active Directory reconnaissance.
  • SharpHound: A tool for Active Directory exploration.
  • GoTokenTheft: Designed to list user tokens and execute commands with them.
  • Remote Desktop Protocol (RDP): Utilized for lateral movement across networks.

Researchers discovered that these attackers often created local administrator accounts, such as asp$ and sawadmin, for the purpose of extracting administrator credentials necessary for further lateral movement.

Closing Recommendations

Organizations are strongly advised to rotate their ASP.NET machine keys and tighten their configuration settings while scanning for any signs of compromise. Caitlin Condon, VP of Security Research at VulnCheck, emphasized that the exploitation of this zero-day vulnerability stems not merely from its configuration but from its public exposure—a reminder that cybercriminals are attentive readers of documentation.

Ryan Dewhurst, head of proactive threat intelligence at watchTowr, pointed out that many Sitecore customers may have unwittingly put themselves at risk by using example keys from official resources instead of generating unique, secure ones. Sitecore has reportedly adapted new deployments to automatically generate secure keys and has reached out to all affected customers.

The broader implications of this vulnerability are still unfolding, but it clearly points to a larger pattern of significant and potentially damaging exploits in the near future.

spot_img

Related articles

Recent articles

New Chrome Vulnerability Allows Malicious Extensions to Elevate Access via Gemini Panel

Recent Google Chrome Vulnerability Exposed: Understanding CVE-2026-0628 Overview of the Security Flaw Cybersecurity experts have revealed a critical security vulnerability in Google Chrome, which has since...

UAE National Carriers Launch Special Flight Operations

UAE Airlines Resume Limited Operations Amid Crisis Recently, UAE national carriers have announced a return to limited flight operations, beginning Monday evening. This decision comes...

German Startup Unleashes Cyborg Insect Swarms for NATO Reconnaissance

ATERMES: Pioneering the Future of Security Technology In a rapidly evolving landscape of security threats, ATERMES stands poised to redefine approaches to border control and...

SEBI Enhances Digital Surveillance to Combat Online Fraud and Protect Investors

Strengthening Investor Protection: SEBI's Digital Monitoring Framework The Growing Need for Vigilance In response to the escalating risk of cyber fraud, the Securities and Exchange Board...