Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

URL has been copied successfully!
Hackers breach Microsoft IIS services using Cityworks RCE bug
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Hackers are exploiting a high-severity remote code execution (RCE) flaw in Cityworks deployments, a GIS-centric asset and work order management software,  to execute codes on a customers’ Microsoft web servers.In a coordinated advisory with the US Cybersecurity and Infrastructure Security Agency (CISA), Cityworks’ developer Trimble said that the vulnerability, tracked as CVE-2025-0994 with CVSS rating 8.6/10, is a severe deserialization flaw and that it is working on a fix that will be released in the next software update.US Cities including Greeley, Baltimore County, and Newport News, along with critical utilities such as Sacramento Suburban Water District and Bay County Road Commission, depend on Cityworks for asset management. A breach could lead to service disruptions, data exposure, and public safety risks, highlighting the need for prompt patching of this vulnerability.”On-premises customers should install the updated version immediately,” Trimble said. “These updates will be automatically applied to all Cityworks Online (CWOL) deployments.”During their investigation after reports of suspicious activities, Trimble said it found overprivileged permissions and suspicious directory activities on a number of Cityworks deployments.”CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures,” CISA said in the advisory. The hackers reportedly exploited the flaw to run codes remotely on customers’ Microsoft Internet Information Services (IIS) web servers, a software that enables web hosting on Windows-based infrastructure.”Trimble has observed that some on-premise deployments may have overprivileged IIS identity permissions,” the company noted. “For avoidance of doubt, and in accordance with our technical documentation, IIS should not be run with local or domain level administrative privileges on any site.”Additionally, the investigation found some deployments as having “inappropriate” attachment directory configurations. Trimble recommended limiting the attachments directory root configuration to folders and subfolders that contain only attachments.Customers looking to update IIS identity permissions can do so by referring to the notes on Cityworks Support Portals. CWOL customers, Trimble clarified, have already received permission corrections and need not do anything.

IOCs reveal CobaltStrike beacon was used for RCE

The advisory included a list of indicators of compromise (IOCs), detailing various tools used by the threat actors for remote intrusion. Among them were WinPutty and CobaltStrike trojans, along with GoLang-based executables designed to load VShell.Also shared were a couple of URLs attackers used for communication and control (C2) operations, established using CobaltStrike.Microsoft Internet Information Services (IIS) web servers are a popular target for threat actors due to their potential for system takeover. Attackers exploit them to gain persistence, escalate privileges, establish command-and-control (C2) channels, and distribute malware. Last week, Microsoft warned that threat actors are targeting these servers in ViewState code injection attacks using publicly disclosed ASP.NET machine keys in an unrelated campaign.

First seen on csoonline.com

Jump to article: www.csoonline.com/article/3820852/hackers-breach-microsoft-iis-services-using-cityworks-rce-bug.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link