First published: 03 Jun 2022
Last updated: 05 Jun 2022

Content written for

Large organisations & infrastructure
Government

Background / What has happened?

On June 3 2022, Atlassian published a security advisory regarding a critical unauthenticated remote code execution (RCE) vulnerability (CVE-2022-26134) in all supported versions of Atlassian Confluence Server and Data Center. 

Exploitation of this RCE vulnerability could allow a malicious actor to remotely install malware or otherwise control the affected device without authentication. 

The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) is aware of malicious actors successfully exploiting the vulnerability prior to Atlassian’s disclosure, however at this time the ASD’s ACSC is not aware of successful exploitation within Australia.

Mitigation / How do I stay secure?

Atlassian has released version updates (7.4.17, 7.13.7, 7.14.3, 7.15.2, 7.16.4, 7.17.4 and 7.18.1) to fix the vulnerability. Atlassian recommends vendors upgrade Confluence immediately.

The ASD’s ACSC recommends Atlassian Confluence Server and Data Center users continue to monitor the Atlassian website for updates as well as future vulnerabilities.

Assistance / Where can I go for help?

The ASD’s ACSC is monitoring the situation and is able to provide assistance and advice as required. Organisations that have been impacted or require assistance can contact the ACSC via 1300 CYBER1 (1300 292 371).

Was this helpful?
Yes this was helpful
No this was not helpful

Thanks for your feedback!

We welcome additional feedback below.

Was this information easy to understand?
Will you take action after reading this?
Did you find the information you were looking for?
Did the design and layout of this page meet your expectations?