Supply Chain Council of European Union | Scceu.org
News

6-year-old Kaseya vulnerability surfaces amid VSA supply chain attack

Credit: 217194570 © Transversospinales | Dreamstime.com

A six-year-old flaw lying in Kaseya’s deprecated billing and customer support site has surfaced amid the ongoing attempt to rectify a supply chain attack on the vendor’s VSA product that has affected over 1000 businesses globally. 

Last week, the US-based IT infrastructure management solutions vendor discovered a potential security incident involving its VSA software, which is used by managed service providers (MSPs) to deliver IT management services to customers.  

John Hammond, senior security researcher at cyber security firm Huntress, said at the time that on 2 July, “many” Kaseya VSA servers were used to deploy ransomware, with the party behind the campaign appearing to be affiliated with the REvil group, which is believed to be linked with Russia.   

According to cyber security expert Brian Krebs, part of the chain involved the exploit CVE-2021-30116, which has been around since April. 

However, this isn’t the only dated Kaseya-related vulnerability to be concerned about, with a new report posted by Krebs on his KrebsOnSecurity site claiming that security incident response firm Mandiant notified the vendor about a six-year-old vulnerability that was still around in an older version of its billing and customer support portal. 

Related posts

Saas-Based Supply Chain Management Software: Market with Coronavirus Impact Analysis | Industry Business Outlook, Revenue, Trends and Forecasts 2026

scceu

Port Leaders Optimistic Over Funding, Supply Chain

scceu

Could coronavirus overwhelm food supply chain, leave grocery stores empty? Experts say no, but warn of disruption

scceu