Supply chain β›“ Supply Chain

Cleo MFT zero-day exploitation by Clop ransomware (CVE-2024-50623 / CVE-2024-55956)

πŸ“… 2024-11-15 🏒 Cleo Harmony, VLTrader, and LexiCom managed file transfer software (versions before 5.8.0.21 / 5.8.0.24) 🦠 Clop (Cl0p) ransomware πŸ”Ž CVE-2024-50623 Β· CVE-2024-55956
Primary Source β†—

Incident Details

Clop ransomware group exploited CVE-2024-50623 in Cleo’s MFT products starting November 2024, bypassing the initial patch. Huntress identified active exploitation 3 December 2024 and disclosed publicly. Active targeting began 6 December, hitting 50+ hosts in North America, primarily retail sector. Clop claimed responsibility 13 December 2024, adding 66 obfuscated victim names to its leak site; final victim count exceeded 200 companies. Blue Yonder (a supply chain management platform used by Fortune 500 companies) was impacted, cascading to downstream customers including major grocery retailers. CVE-2024-55956 (the bypassed patch) was fully addressed in version 5.8.0.24. Pattern mirrors Clop’s prior campaigns against Accellion FTA (2020), GoAnywhere (2023), and MOVEit (2023).

Technical Details

Initial Attack Vector
CWE-434: Unrestricted Upload of File with Dangerous Type (CVE-2024-50623 / CVE-2024-55956 β€” unauthenticated file write vulnerability in Cleo Harmony, VLTrader, and LexiCom MFT software enabling RCE)
Vendor / Product
Cleo Harmony, VLTrader, and LexiCom managed file transfer software (versions before 5.8.0.21 / 5.8.0.24)
Software Package
cleo-harmony
Malware Family
Clop (Cl0p) ransomware
CVE / GHSA References
CVE-2024-50623 CVE-2024-55956
Supply Chain Attack
βœ… Confirmed third-party / vendor compromise

Timeline

  1. 2024-11-15 Breach occurred
  2. 2024-12-09 Publicly disclosed
  3. 2024-12-13 Customers notified