CISA Urges Quick Action to Patch Critical Sitecore Vulnerability Being Actively Exploited

Published:

spot_img

Urgent Advisory: Sitecore Vulnerability Requires Immediate Attention

Introduction to the Vulnerability

Agencies within the Federal Civilian Executive Branch (FCEB) have been urged to update their Sitecore systems by September 25, 2025, in light of a significant security flaw currently being exploited. This vulnerability, identified as CVE-2025-53690, has received a critical CVSS score of 9.0 out of 10, indicating its severity.

Nature of the Vulnerability

According to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the flaw resides in several Sitecore products, including Sitecore Experience Manager (XM), Experience Platform (XP), Experience Commerce (XC), and Managed Cloud. Specifically, it involves the deserialization of untrusted data linked to default machine keys. This makes it possible for attackers to leverage exposed ASP.NET machine keys to execute remote code.

Discovery and Attack Patterns

The security risk was first identified by Mandiant, a Google-owned cybersecurity firm, which uncovered an active ViewState deserialization attack capitalizing on a machine key publicly available in Sitecore deployment manuals from 2017 and earlier. This activity does not appear to be tied to any known threat actor or group.

Mandiant’s researchers noted that the attackers demonstrated a sophisticated understanding of the compromised system, seamlessly transitioning from initial infiltration to escalating privileges within the network.

Historical Context of Exploitation

Microsoft first reported the misuse of publicly disclosed ASP.NET machine keys in February 2025, observing limited exploitation attempts dating back to December 2024. Attackers used these keys to deploy the Godzilla post-exploitation framework. Furthermore, in May 2025, an improper authentication issue affecting ScreenConnect (CVE-2025-3935) was found to be exploited by a state-sponsored actor employing ViewState code injection attacks targeted at select customers.

Current Threat Landscape

As recently as July, an Initial Access Broker (IAB) named Gold Melody was linked to campaigns targeting leaked ASP.NET machine keys, allowing unauthorized access that was later sold to other cybercriminals. Mandiant has documented that CVE-2025-53690 can be weaponized to infiltrate internet-facing Sitecore instances, leading to the use of various tools for reconnaissance, remote access, and Active Directory exploration.

The malware engaged in these attacks included a .NET assembly known as WEEPSTEEL, which not only gathers system, network, and user data but also facilitates data exfiltration to attackers.

Tools and Methods in Use

The attackers established footholds and escalated privileges efficiently using a combination of tools designed for network tunneling and reconnaissance. Key tools included:

  • EarthWorm: Used for network tunneling with SOCKS.
  • DWAgent: For persistent remote access and Active Directory reconnaissance.
  • SharpHound: A tool for Active Directory exploration.
  • GoTokenTheft: Designed to list user tokens and execute commands with them.
  • Remote Desktop Protocol (RDP): Utilized for lateral movement across networks.

Researchers discovered that these attackers often created local administrator accounts, such as asp$ and sawadmin, for the purpose of extracting administrator credentials necessary for further lateral movement.

Closing Recommendations

Organizations are strongly advised to rotate their ASP.NET machine keys and tighten their configuration settings while scanning for any signs of compromise. Caitlin Condon, VP of Security Research at VulnCheck, emphasized that the exploitation of this zero-day vulnerability stems not merely from its configuration but from its public exposure—a reminder that cybercriminals are attentive readers of documentation.

Ryan Dewhurst, head of proactive threat intelligence at watchTowr, pointed out that many Sitecore customers may have unwittingly put themselves at risk by using example keys from official resources instead of generating unique, secure ones. Sitecore has reportedly adapted new deployments to automatically generate secure keys and has reached out to all affected customers.

The broader implications of this vulnerability are still unfolding, but it clearly points to a larger pattern of significant and potentially damaging exploits in the near future.

spot_img

Related articles

Recent articles

Raleigh, N.C., Strengthens City Operations with AI-Driven Technology Strategy

Raleigh, N.C., Strengthens City Operations with AI-Driven Technology Strategy Raleigh, North Carolina, is making significant strides in enhancing its municipal operations through a comprehensive technology...

China’s Control of North America’s Largest Antimony Mine Raises National Security Risks for Canada

China's Control of North America's Largest Antimony Mine Raises National Security Risks for Canada In the rugged interior of Newfoundland, approximately an hour's drive from...

Uganda Strengthens Agricultural Sector with National Feed and Fodder Data Dashboard Set for April Launch

Uganda Strengthens Agricultural Sector with National Feed and Fodder Data Dashboard Set for April Launch The Ministry of Agriculture, Animal Industry and Fisheries (MAAIF) of...

Pentagon Labels Anthropic a Supply Chain Risk as Palantir CEO Confirms Ongoing Use of Claude AI

Pentagon Labels Anthropic a Supply Chain Risk as Palantir CEO Confirms Ongoing Use of Claude AI Washington | The United States Department of Defense recently...