Open Nav
Sign Up

Multiple Vulnerabilities in Perforce Server

Multiple Vulnerabilities in Perforce Server

Bar Refael

December 26, 2023

We are issuing an urgent security advisory regarding recently discovered vulnerabilities in the Perforce source-code management platform, widely used across various industries. Microsoft has identified four critical flaws in Perforce Helix Core Server, with the most severe allowing for remote code execution (RCE) and network takeover.

Key Vulnerabilities and Implications:

  • Highly Privileged Access (CVE-2023-45849, CVSS 9.8): The most critical vulnerability enables unauthenticated attackers to execute code with LocalSystem privileges, potentially leading to complete system control, backdoor installation, sensitive data access, and system setting alterations.
  • Denial-of-Service Risks (CVE-2023-35767, CVE-2023-45319, CVE-2023-5759, CVSS 7.5 each): These vulnerabilities allow unauthenticated attackers to induce DoS attacks via remote commands and exploitation through RPC headers.
  • Impact on Software Development Life Cycle (SDLC): Given Perforce Server’s role in SDLC management, exploitation of these vulnerabilities could extend to connected information systems and the wider software supply chain.

Mitigation and Security Recommendations:

  • Immediate Update Required: Organizations using Perforce Server should immediately update to the patched version (2023.1/2513900) released by Perforce Software.
  • Enhanced Vigilance: Remain alert for any signs of exploitation and regularly monitor systems for unusual activities.
  • Comprehensive Patching Strategy: Regularly update not just Perforce but all third-party software.
  • Network Security Measures: Employ VPNs and/or IP allow-lists to restrict Perforce Server communication, issue TLS certificates to verified users, and implement TLS termination proxies.
  • Robust Logging and Monitoring: Ensure all access to Perforce instances is logged, and configure alert systems for immediate notifications in case of process crashes or suspicious activities.
  • Network Segmentation: Limit potential attack pivots within the network through effective segmentation.

OP Innovate’s Commitment:

We are closely monitoring this situation and are ready to assist you in implementing these security measures. Our team is dedicated to ensuring your organization’s cybersecurity resilience in the face of evolving threats.

Please reach out to us for any assistance or further information regarding this alert.

Resources highlights

Critical Cisco ISE Vulnerabilities Lead to Unauthenticated RCE (CVE-2025-20281 & CVE-2025-20282)

On June 25, 2025, Cisco disclosed and patched two critical remote code execution (RCE) vulnerabilities: CVE-2025-20281 and CVE-2025-20282, affecting its widely deployed Identity Services Engine…

Read more >

CVE-2025-20281 & CVE-2025-20282

Critical Vulnerability in MegaRAC BMC Added to CISA’s KEV: CVE-2024-54085

On June 25, 2025, CISA added CVE‑2024‑54085, a critical authentication bypass vulnerability in the MegaRAC SPx Baseboard Management Controller (BMC) firmware, to its Known Exploited…

Read more >

CVE-2024-54085

‘UMBRELLA STAND’ Malware Targets Fortinet FortiGate Firewalls

‘UMBRELLA STAND’ Malware Targets Fortinet FortiGate Firewalls The UK’s National Cyber Security Centre (NCSC) has issued an alert regarding a sophisticated malware campaign dubbed “UMBRELLA…

Read more >

umbrella stand fortinet

CVE-2025-49144: Privilege Escalation in Notepad++ Installer Enables Full SYSTEM Access

A critical local privilege escalation vulnerability in the Notepad++ v8.8.1 installer allows attackers to escalate to NT AUTHORITY\SYSTEM using binary planting techniques. Tracked as CVE-2025-49144,…

Read more >

CVE-2025-49144

Our Red Team’s Favorite Penetration Testing Tools in 2025 (And How We Use Them)

When it comes to red team operations, the tools you choose can make or break the engagement. From initial reconnaissance to post-exploitation, having a streamlined,…

Read more >

pentesting tools - op

New Linux Vulnerabilities (CVE-2025-6018 & CVE-2025-6019) Enable Full Root Access in Seconds

Security researchers have uncovered a critical privilege escalation chain in major Linux distributions that allows any local user with a session (SSH or GUI) to…

Read more >

CVE-2025-6018, CVE-2025-6019
Under Cyber Attack?

Fill out the form and we will contact you immediately.