Vulnerabilities

3CX Urges Customers to Disable Integration Due to Potential Vulnerability

3CX tells customers to temporarily disable SQL Database integration to mitigate a potential vulnerability.

3CX tells customers to temporarily disable SQL Database integration to mitigate a potential vulnerability.

Business communication company 3CX is urging customers to disable SQL database integrations to prevent a vulnerability that occurs in certain configurations.

In a security advisory published on Friday, the company revealed that 3CX versions 18 and 20 are impacted by an integration bug.

“Only 0.25% of our user base have sequel integrated. It’s an old-style integration meant for an on-premise firewall secured network. Nevertheless, if you are using an SQL database integration, it’s subject potentially to a vulnerability – depending upon the configuration,” the company said.

According to 3CX, customers using MongoDB, MsSQL, MySQL, and PostgreSQL databases should disable their SQL database integrations until further notice.

“As a precautionary measure, and whilst we work on a solution to safely re-enable this integration, please follow the instructions below to disable it,” the company underlined.

To disable the integration, customers should go to the Settings section of the management console, go to CRM, set the available option to ‘None’, and save the modification.

Web-based CRM integrations are not affected, 3CX says. The company has yet to provide technical details on the identified security defect.

In March this year, it came to light that North Korean hackers had compromised 3CX’s Windows and macOS build environments after an employee downloaded a trojanized application on their personal computer.

Advertisement. Scroll to continue reading.

The supply chain attack led to malware being pushed to the company’s customers, with organizations in Europe and North America being impacted the most. 

More than 600,000 companies worldwide are using 3CX’s VoIP software.

Related: Atlassian CISO Urges Quick Action to Protect Confluence Instances From Critical Vulnerability

Related: CISA Offering Free Vulnerability Scanning Service to Water Utilities

Related: Recent NetScaler Vulnerability Exploited as Zero-Day Since August

Related Content

Nation-State

The North Korean hacking group behind the supply chain attack that hit 3CX also broke into two critical infrastructure organizations in the energy sector.

Supply Chain Security

3CX hack is the first known cascading supply chain attack, with the breach starting after an employee downloaded compromised software from a different firm.

Malware & Threats

3CX has confirmed previous reports that the recently disclosed supply chain attack was likely conducted by North Korean hackers.

Cybercrime

3CX supply chain attack appears to have been conducted by North Korean hackers with the goal of targeting cryptocurrency firms.

Supply Chain Security

Europe, the United States and Australia seem to be the most impacted by the 3CX supply chain hack, according to data from two cybersecurity...

Malware & Threats

Several cybersecurity companies have published blog posts, advisories and tools to help organizations that may have been hit by the 3CX supply chain attack.

Malware & Threats

3CX confirms investigating a security breach as the cybersecurity community is sharing more information on what appears to be a sophisticated supply chain attack.

Supply Chain Security

CrowdStrike threat intelligence team warns about unexpected malicious activity from a legitimate, signed version of the 3CXDesktopApp.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version