Open Nav
Sign Up

Multiple Vulnerabilities in Perforce Server

Multiple Vulnerabilities in Perforce Server

Bar Refael

December 26, 2023

We are issuing an urgent security advisory regarding recently discovered vulnerabilities in the Perforce source-code management platform, widely used across various industries. Microsoft has identified four critical flaws in Perforce Helix Core Server, with the most severe allowing for remote code execution (RCE) and network takeover.

Key Vulnerabilities and Implications:

  • Highly Privileged Access (CVE-2023-45849, CVSS 9.8): The most critical vulnerability enables unauthenticated attackers to execute code with LocalSystem privileges, potentially leading to complete system control, backdoor installation, sensitive data access, and system setting alterations.
  • Denial-of-Service Risks (CVE-2023-35767, CVE-2023-45319, CVE-2023-5759, CVSS 7.5 each): These vulnerabilities allow unauthenticated attackers to induce DoS attacks via remote commands and exploitation through RPC headers.
  • Impact on Software Development Life Cycle (SDLC): Given Perforce Server’s role in SDLC management, exploitation of these vulnerabilities could extend to connected information systems and the wider software supply chain.

Mitigation and Security Recommendations:

  • Immediate Update Required: Organizations using Perforce Server should immediately update to the patched version (2023.1/2513900) released by Perforce Software.
  • Enhanced Vigilance: Remain alert for any signs of exploitation and regularly monitor systems for unusual activities.
  • Comprehensive Patching Strategy: Regularly update not just Perforce but all third-party software.
  • Network Security Measures: Employ VPNs and/or IP allow-lists to restrict Perforce Server communication, issue TLS certificates to verified users, and implement TLS termination proxies.
  • Robust Logging and Monitoring: Ensure all access to Perforce instances is logged, and configure alert systems for immediate notifications in case of process crashes or suspicious activities.
  • Network Segmentation: Limit potential attack pivots within the network through effective segmentation.

OP Innovate’s Commitment:

We are closely monitoring this situation and are ready to assist you in implementing these security measures. Our team is dedicated to ensuring your organization’s cybersecurity resilience in the face of evolving threats.

Please reach out to us for any assistance or further information regarding this alert.

Resources highlights

CVE-2026-6973: Actively Exploited Ivanti EPMM Vulnerability Enables RCE

Ivanti has released security updates for Ivanti Endpoint Manager Mobile (EPMM) after confirming limited in-the-wild exploitation of CVE-2026-6973, a high-severity remote code execution vulnerability affecting…

Read more >

CVE-2026-6973

CVE-2026-0300: Actively Exploited Palo Alto PAN-OS Vulnerability Enables Root-Level RCE

Palo Alto Networks has disclosed a critical PAN-OS vulnerability, tracked as CVE-2026-0300, affecting the User-ID Authentication Portal, also known as the Captive Portal. The flaw…

Read more >

cve-2026-0300

CVE-2026-41940: Critical cPanel & WHM Authentication Bypass

A critical authentication bypass vulnerability, tracked as CVE-2026-41940, has been disclosed in cPanel & WHM, one of the most widely used web hosting control panel…

Read more >

cve-2026-41940

CVE-2026-25874: Critical Hugging Face LeRobot Vulnerability Enables Unauthenticated RCE

A critical unpatched vulnerability has been disclosed in Hugging Face LeRobot, an open-source robotics platform used for AI-driven robotics research and development. The flaw, tracked…

Read more >

CVE-2026-25874

BlueHammer: Microsoft Defender Privilege Escalation (CVE-2026-33825)

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-33825, also known as BlueHammer, to its Known Exploited Vulnerabilities (KEV) Catalog, confirming active exploitation…

Read more >

CVE-2026-33825

CISA Flags Actively Exploited Cisco SD-WAN Vulnerabilities (CVE-2026-20133, CVE-2026-20122, CVE-2026-20128)

CISA has added multiple Cisco Catalyst SD-WAN vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, indicating active exploitation in the wild. These flaws affect SD-WAN…

Read more >

cisco sd-wan
Under Cyber Attack?

Fill out the form and we will contact you immediately.