vBulletin fixes critical vulnerability, patch immediately!

If you’re using vBulletin to power your online forum(s), you should implement the newest security patches offered by the developers as soon as possible.

The patches fix CVE-2020-12720, a vulnerability affecting versions 5.5.6, 5.6.0 and 5.6.1 with could be exploited without previous authentication.

About CVE-2020-12720

CVE-2020-12720 has been defined as an incorrect access control issue, but no additional information has been shared.

Charles Fol, a security engineer at Ambionics Security, discovered and reported the “critical” vulnerability and will be sharing details about it in early June at the SSTIC infosec conference.

In the meantime, security researchers have been analyzing the changes made to the software’s code with the latest updates and trying to discover more about the fixed flaw(s).

You can be sure that malicious actors are trying to do that as well. If they succeed in creating a working exploit, nothing will stop them from mounting attacks.

What now?

The last time a critical vBulletin flaw and an exploit for it were released to the public, attackers started actively targeting vBulletin-based online forums right away.

This time, users are lucky to get an early warning and can implement the patches before the attacks start.

Share this
You are reading
vBulletin

vBulletin fixes critical vulnerability, patch immediately!