Detection and Mitigation for JetBrains TeamCity Vulnerability CVE-2023-42793

DeepSeas has deployed the following rules to support its MDR customers:

  • TeamCity Java Scheduling Task
  • Suspicious Child Processes of TeamCity Java
  • EDRSandblast Indicators

The following are recommendations for detection opportunities:

  • Review the teamcity-server.log file for any indications of potentially malicious activity between 01 September 2023 and present. If proxied, examine proxy logs for the same.
  • Look for unusual traffic against the /app/rest/users/id:1/tokens/RPC2 endpoint, which is required for exploitation of CVE-2023-42793.

The following are recommendations for mitigation:

  • Ensure that all JetBrains TeamCity servers are fully patched.
  • Ensure that, if unpatched, JetBrains TeamCity servers are not public-facing.
  • If patching is not an option, install the official JetBrains security patch plugin.

Explore DeepSeas MDR+

References

https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-347a

https://www.fortinet.com/blog/threat-research/teamcity-intrusion-saga-apt29-suspected-exploiting-cve-2023-42793