Alert!

Nextcloud: Attackers can bypass two-factor authentication

The cloud service software Nextcloud is vulnerable. The developers have closed several security gaps in current versions.

Save to Pocket listen Print view

(Image: ZinetroN/Shutterstock.com)

2 min. read

If you operate your own cloud with Nextcloud, you should update your server. Otherwise, attacks are possible and attackers can gain access.

The cloud software provider has closed a total of twelve security vulnerabilities. In addition to Nextcloud Server and Nextcloud Enterprise Server, certain components such as the calendar are also at risk.

The majority of vulnerabilities are classified as"medium" threat level. After successful attacks, attackers can manipulate calendar entries and direct victims to a website they control, among other things.

Two vulnerabilities in Nextcloud and Nextcloud Enterprise are considered the most dangerous. At these points, attackers can extend the rights of shares (CVE-2024-37882"high") or bypass two-factor authentication (CVE-2024-37313"high"). The developers do not currently specify how such attacks could take place.

Because a list of the threatened and repaired versions would go beyond the scope of this message, admins must read this information in the linked warning posts.

List sorted by threat level in descending order:

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.