What We Do
How we do it
Our Threat Response Unit (TRU) publishes security advisories, blogs, reports, industry publications and webinars based on its original research and the insights driven through proactive threat hunts.
View Threat Intelligence Resources →
Aug 03, 2022
CVE-2022-31656 – Critical VMware Vulnerability
THE THREAT On August 2nd, 2022, VMware disclosed a new critical vulnerability impacting multiple VMware products. The vulnerability, tracked as CVE-2022-31656 (CVSS: 9.8) is an authentication…
Read More
View all Advisories →
About Us
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 1500+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
Read about how we got here
Leadership Work at eSentire
Aug 11, 2022
eSentire Researchers Unmask the Top Malware Supplier to Russia’s Most Notorious Financial Crime Families: Fin6 and Cobalt Group
Waterloo, ON, and Las Vegas, NV, August 11, 2022 — eSentire, the Authority in Managed Detection and Response (MDR), released a report today, unmasking the threat actor behind the Golden Chickens malware, the weapon of choice for Russia’s most infamous financial cybercrime families— FIN6 and Cobalt Group. Joe Stewart and Keegan Keplinger, security researchers with eSentire‘s Threat Response Unit…
Read More
e3 Ecosystem
We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Learn more
Apply to become an e3 ecosystem partner with eSentire, the Authority in Managed Detection and Response.
Login to the Partner Portal for resources and content for current partners.
Security advisories — Jun 03, 2022

UPDATE: CVE-2022-26134 – Confluence Zero-Day Vulnerability

1 minute read
Speak With A Security Expert Now


June 3rd Update: Atlassian has released security patches to address this vulnerability.

On June 2nd, 2022, Atlassian disclosed a critical vulnerability impacting the Confluence collaboration tool, tracked as CVE-2022-26134; active exploitation of the vulnerability has been confirmed. CVE-2022-26134 is an unauthenticated Remote Code Execution (RCE) vulnerability that impacts all supported versions of Confluence Server and Data Center. Exploitation of this vulnerability would allow an unauthenticated and remote actor to execute code on vulnerable devices, potentially leading to the deployment of malware or the exfiltration of sensitive data.

Organizations are strongly recommended to apply the relevant security patches released by Atlassian on June 3rd, as exploitation is ongoing.

What we’re doing about it

What you should do about it

Additional information

Technical details relating to CVE-2022-26134 are currently limited. While not yet confirmed, it is likely that all versions of Confluence Server and Data Center are impacted, including out of support versions. The vulnerability does not impact Confluence Cloud.

CVE-2022-26134 was initially discovered by Volexity. According to the company, attacks exploiting the vulnerability were first identified on the Memorial Day weekend (May 28th-30th). Attacks observed by Volexity resulted in the deployment of the open-source webshell BEHINDER, a file upload webshell, and the China Chopper webshell. According to Volexity, multiple threat actor groups are believed to be exploiting the vulnerability in real-world attacks.


[1] https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html
[2] https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html
[3] https://www.volexity.com/blog/2022/06/02/zero-day-exploitation-of-atlassian-confluence/

Join 100,000+ Security Leaders

Get notified when there's a new security advisory, and receive the latest news, intel and helpful tools & assets. You can unsubscribe anytime.

By clicking the button below I confirm that I have read and agree to the eSentire privacy policy.

View Most Recent Blogs