Open Nav
Sign Up

Multiple Vulnerabilities in Perforce Server

Multiple Vulnerabilities in Perforce Server

Bar Refael

December 26, 2023

We are issuing an urgent security advisory regarding recently discovered vulnerabilities in the Perforce source-code management platform, widely used across various industries. Microsoft has identified four critical flaws in Perforce Helix Core Server, with the most severe allowing for remote code execution (RCE) and network takeover.

Key Vulnerabilities and Implications:

  • Highly Privileged Access (CVE-2023-45849, CVSS 9.8): The most critical vulnerability enables unauthenticated attackers to execute code with LocalSystem privileges, potentially leading to complete system control, backdoor installation, sensitive data access, and system setting alterations.
  • Denial-of-Service Risks (CVE-2023-35767, CVE-2023-45319, CVE-2023-5759, CVSS 7.5 each): These vulnerabilities allow unauthenticated attackers to induce DoS attacks via remote commands and exploitation through RPC headers.
  • Impact on Software Development Life Cycle (SDLC): Given Perforce Server’s role in SDLC management, exploitation of these vulnerabilities could extend to connected information systems and the wider software supply chain.

Mitigation and Security Recommendations:

  • Immediate Update Required: Organizations using Perforce Server should immediately update to the patched version (2023.1/2513900) released by Perforce Software.
  • Enhanced Vigilance: Remain alert for any signs of exploitation and regularly monitor systems for unusual activities.
  • Comprehensive Patching Strategy: Regularly update not just Perforce but all third-party software.
  • Network Security Measures: Employ VPNs and/or IP allow-lists to restrict Perforce Server communication, issue TLS certificates to verified users, and implement TLS termination proxies.
  • Robust Logging and Monitoring: Ensure all access to Perforce instances is logged, and configure alert systems for immediate notifications in case of process crashes or suspicious activities.
  • Network Segmentation: Limit potential attack pivots within the network through effective segmentation.

OP Innovate’s Commitment:

We are closely monitoring this situation and are ready to assist you in implementing these security measures. Our team is dedicated to ensuring your organization’s cybersecurity resilience in the face of evolving threats.

Please reach out to us for any assistance or further information regarding this alert.

Resources highlights

Critical Zero-Day in CrushFTP Exploited in the Wild (CVE-2025-54309)

A critical zero-day vulnerability in CrushFTP, CVE-2025-54309, is being actively exploited by threat actors to gain unauthenticated administrative access to vulnerable servers via HTTPS. The…

Read more >

CVE-2025-54309

Critical Zero-Day in Microsoft SharePoint Actively Exploited (CVE-2025-53770)

A newly discovered zero-day vulnerability in Microsoft SharePoint Server, tracked as CVE-2025-53770, is currently being exploited in active attacks against on-premises environments. The flaw, rated…

Read more >

CVE-2025-53770

Over 600 Laravel Applications Vulnerable to Remote Code Execution via Leaked APP_KEYs (CVE-2018-15133, CVE-2024-55556)

Security researchers have uncovered a major RCE threat affecting over 600 Laravel applications, triggered by leaked APP_KEYs found on public GitHub repositories. Laravel's APP_KEY, typically…

Read more >

CVE-2018-15133, CVE-2024-55556

CVE-2025-3648: “Count(er) Strike” Vulnerability in ServiceNow

CVE-2025-3648, dubbed “Count(er) Strike”, is a high-severity vulnerability (CVSS 8.2) in ServiceNow's Now Platform, discovered by Varonis Threat Labs. The flaw allows both authenticated and…

Read more >

CVE-2025-3648

What to Look for in a Pentesting Platform (Beyond Just Scans)

Penetration testing platforms are a great way to centralize vulnerability discovery and triage. However, when evaluating penetration testing platforms, many organizations make the mistake of…

Read more >

pentesting platform

CVE-2016-10033: Actively Exploited Remote Code Execution (RCE) Vulnerability in PHPMailer

CVE-2016-10033 is a critical remote code execution vulnerability in PHPMailer, a widely used PHP library for sending emails. The flaw lies in the mailSend function…

Read more >

CVE-2016-10033
Under Cyber Attack?

Fill out the form and we will contact you immediately.