Supply chain ⛓ Supply Chain

JetBrains TeamCity CVE-2024-27198 Authentication Bypass — Mass Exploitation

📅 2024-03-04 🏢 JetBrains TeamCity (CI/CD server and build management platform) 🦠 Various backdoors and remote access tools deployed by exploiting actors 🔎 CVE-2024-27198 · CVE-2024-27199
Primary Source ↗

Incident Details

On 4 March 2024, JetBrains and Rapid7 (the discoverer) simultaneously disclosed two authentication bypass vulnerabilities in JetBrains TeamCity — a popular CI/CD build server used by over 30,000 organisations including many large enterprises. CVE-2024-27198 (CVSS 9.8) allowed unauthenticated attackers to access the TeamCity REST API and gain full administrative control without valid credentials. CVE-2024-27199 (CVSS 7.3) allowed path traversal for limited server configuration exposure. JetBrains released patches (2023.11.4) and a standalone security patch plugin on 4 March. Mass exploitation began within hours of disclosure. CISA published an advisory. The Russian SVR-linked group Midnight Blizzard (APT29/Cozy Bear) was identified as exploiting CVE-2024-27198 to compromise TeamCity servers — mirroring their earlier 2023 TeamCity exploitation (CVE-2023-42793). BleepingComputer documented multiple ransomware actors also exploiting the vulnerability. Shodan identified approximately 1,700 internet-exposed TeamCity instances at time of disclosure. Compromising a TeamCity server is particularly valuable to attackers because: (1) it contains source code repositories and build artifacts; (2) it stores credentials and API tokens for deployment pipelines; (3) it can be used to inject malicious code into software builds, enabling downstream software supply chain attacks. CISA noted that SVR actors had previously used TeamCity vulnerabilities (2023) to gain initial access leading to downstream customer compromise. JetBrains was criticised for attempting a coordinated disclosure timeline that Rapid7 did not agree to, leading to the simultaneous disclosure before many users could patch.

Technical Details

Initial Attack Vector
Authentication bypass vulnerability (CVE-2024-27198, CVSS 9.8) in JetBrains TeamCity CI/CD server allowed unauthenticated remote attackers to gain administrative access to TeamCity build servers; a second vulnerability (CVE-2024-27199, CVSS 7.3) allowed path traversal; multiple threat actors exploited these within hours of Rapid7's public disclosure, abusing admin access to plant backdoors in CI/CD pipelines and steal source code, credentials, and build artifacts
Vendor / Product
JetBrains TeamCity (CI/CD server and build management platform)
Software Package
TeamCity
Malware Family
Various backdoors and remote access tools deployed by exploiting actors
CVE / GHSA References
CVE-2024-27198 CVE-2024-27199
Supply Chain Attack
✅ Confirmed third-party / vendor compromise

Timeline

  1. 2024-03-04 Breach occurred
  2. 2024-03-04 Publicly disclosed
  3. 2024-03-04 Customers notified