Heimdal Security Blog

Kaseya Patches the Vulnerabilities Used in REvil Ransomware Attack

Kaseya released a patch for the vulnerabilities that were used by REvil in what seems to be one of the largest ransomware attacks, in which the ransomware gang, also known as Sodinokibi, targeted MSPs with thousands of customers.

Back in April, the Dutch Institute for Vulnerability Disclosure (DIVD) had disclosed seven vulnerabilities to Kaseya with most of them being quickly patched, but the on-premise version of VSA vulnerability was unfortunately left unresolved.

The REvil ransomware group managed to make use of these vulnerabilities and launch a massive attack earlier this month and as a result of this attack, more than 60 MSPs that were using the on-premise VSA servers and 1,500 business customers were affected.

Until now it remains unclear which vulnerabilities were used in the attack, researchers believing to be one or a combination of CVE-2021-30116, CVE-2021-30119, and CVE-2021-30120.

Kaseya’s Newly Released Security Updates

Kaseya had previously urged the on-premise VSA customers to shut down their servers until a patch is ready and now has released the VSA 9.5.7a (9.5.7.2994) update that will `fix the vulnerabilities used in the REvil ransomware attack.

As posted in the previous update we released the patch to VSA On-Premises customers and began deploying to our VSA SaaS Infrastructure prior to the 4:00 PM target. The restoration of services is progressing, with 95% of our SaaS customers live and the remaining servers coming online for the rest of our customers in the coming hours. Our support teams are working with VSA On-Premises customers who have requested assistance with the patch.

Source

Some of the issues addressed in the patch were:

Kaseya is urging its customers to follow the ‘On-Premises VSA Startup Readiness Guide‘ steps before installing the update in order to prevent further breaches and make sure devices are not already compromised by using the “Compromise Detection Tool,” in order to detect whether a VSA server or endpoints have been compromised.

An extra step that can be taken for added security is the restriction of on-premise VSA admin access to the web GUI to local IP addresses and those known to be used by security products.

For VSA On-Premises installations, we have recommended limiting access to the VSA Web GUI to local IP addresses by blocking port 443 inbound on your internet firewall.  Some integrations may require inbound access to your VSA server on port 443.  Below are a list of IP addresses you can whitelist in your firewall (allow 443 inbound to FROM ), if you are using these integrations with your VSA On-Premises product.

Source

It’s important to know that after installing the patch, all users will be required to change their passwords.