Background
Cleo is a managed file transfer (MFT) software vendor whose products — Harmony, VLTrader, and LexiCom — are widely used in supply chain, logistics, and e-commerce sectors for B2B data exchange. Cleo’s MFT platform handles sensitive business transactions including purchase orders, invoices, shipping manifests, and EDI (Electronic Data Interchange) documents. Its role as a B2B data exchange hub makes it a strategically valuable target — similar to the GoAnywhere and MOVEit attacks that preceded it.
CVE-2024-55956 is a critical unrestricted file upload vulnerability disclosed in December 2024. It was exploited as a zero-day by the Clop ransomware group (the same group responsible for the GoAnywhere and MOVEit zero-day campaigns) before patches were available, following the group’s established pattern of targeting MFT platforms in coordinated mass exploitation campaigns.
Technical Mechanism
CVE-2024-55956 is an unrestricted file upload vulnerability in Cleo Harmony, VLTrader, and LexiCom’s autorun feature. These products include a file-based automation feature that watches specific directories for files and executes commands or processes them automatically when files are placed in those directories.
The vulnerability arises because:
- The autorun directory is accessible without authentication
- Files placed in the autorun directory are executed by the application
An attacker can upload malicious files to the autorun directory via a crafted HTTP request, and the Cleo application will process and execute those files:
# Step 1: Upload malicious file to unauthenticated autorun endpoint
PUT /Cleo/Harmony/inbox/../autorun/<malicious_file.xml> HTTP/1.1
Host: cleo.target.com
Content-Type: application/xml
<xml content that executes OS commands when processed>
The autorun feature processes XML-based workflow definitions. A malicious XML file can define a workflow step that executes arbitrary OS commands using Cleo’s built-in scripting capabilities (VBScript, Groovy, or Bash, depending on platform).
Combined with CVE-2024-50623 (an earlier path traversal in the same product line), the full attack chain provides unauthenticated access to the autorun directory and arbitrary command execution. The Cleo application runs as a Windows service with SYSTEM or high-privilege service account permissions on most deployments, providing elevated code execution.
Real-World Exploitation Evidence
The Clop ransomware group claimed responsibility for exploiting CVE-2024-55956 in a coordinated campaign beginning in December 2024:
- Zero-day timing: Clop began exploitation before Cleo’s December 2024 advisory, following the same zero-day acquisition and coordinated mass exploitation pattern seen with GoAnywhere (2023) and MOVEit (2023).
- Targeted sectors: Cleo’s customer base includes retail, manufacturing, logistics, and supply chain companies — sectors with high-value B2B transaction data. Clop’s initial targeting focused on these industries.
- MALICHUS backdoor: Post-exploitation analysis revealed deployment of a Java-based backdoor (variously named MALICHUS or similar by threat intelligence vendors) that provided persistent access through Cleo’s Java runtime.
- Data exfiltration focus: Consistent with Clop’s MFT campaign methodology, the focus was on mass data theft followed by extortion threats rather than ransomware encryption.
- Rapid disclosure: Cleo issued its initial advisory rapidly but the initial “workaround” guidance was insufficient — a second advisory corrected remediation steps.
Impact Assessment
Cleo MFT platform compromise provides access to:
- B2B transaction data: All files transferred through the platform — purchase orders, invoices, EDI documents, shipping data, financial records.
- Trading partner connectivity: Cleo maintains connection profiles and credentials for all configured B2B trading partners; these credentials enable impersonation.
- Internal network access: Cleo servers are often positioned with broad internal network access to receive and distribute files to backend systems.
- Automated workflow execution: Cleo’s automation workflows often connect to databases, ERP systems, and other business-critical systems.
- Customer data exposure: For service providers using Cleo for customer file exchange, customer data across multiple clients may be accessible.
Affected Versions
| Product | Affected Versions | Fixed Version |
|---|---|---|
| Cleo Harmony | 5.8.0.21 and prior | 5.8.0.24+ |
| Cleo VLTrader | 5.8.0.21 and prior | 5.8.0.24+ |
| Cleo LexiCom | 5.8.0.21 and prior | 5.8.0.24+ |
Remediation Steps
-
Apply Cleo patches: Upgrade to version 5.8.0.24 or later. Download from the Cleo partner portal.
-
Disable the autorun feature immediately (critical interim mitigation):
- Navigate to Cleo’s administrative settings
- Disable or restrict the autorun directory feature
- Remove any unexpected files from the autorun directory
-
Check for IOCs before patching:
# Check autorun directory for unexpected files dir "C:\Cleo\Harmony\autorun\" /a # Check for unexpected JAR or XML files dir /s /b "C:\Cleo\Harmony\" *.jar | findstr /v official -
Network isolation: Ensure the Cleo management interface is not internet-accessible. Implement firewall rules restricting access to internal networks.
-
Review trading partner configurations: After patching, audit all configured trading partner connections for unauthorised changes.
-
Audit Windows services: Verify no new Windows services were installed on the Cleo server during the exploitation window.
Detection Guidance
Log sources:
- Cleo application logs in the installation directory
- Windows Event Logs (Event ID 4688 for process creation, 7045 for service installation)
- IIS/web server access logs if Cleo’s HTTP interface is proxied
Suspicious autorun activity:
# Check Windows Event Log for unexpected process creation
Get-WinEvent -LogName Security | Where-Object {$_.Id -eq 4688 -and $_.Message -like "*Harmony*"}
# Look for unexpected PowerShell or cmd.exe spawned from Cleo
Get-WinEvent -LogName Security | Where-Object {$_.Id -eq 4688 -and $_.Message -like "*cleoapp*"}
File system IOCs:
- Unexpected
.xml,.jar, or.groovyfiles in Cleo autorun directory - Modified files in Cleo application directory with recent timestamps
Suricata signature:
alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"Cleo MFT CVE-2024-55956 Autorun File Upload"; flow:established,to_server; http.method; content:"PUT"; http.uri; content:"autorun"; nocase; sid:9002559; rev:1;)
Timeline
| Date | Event |
|---|---|
| ~December 2024 | Clop begins zero-day exploitation |
| December 9, 2024 | Cleo publishes initial advisory |
| December 10, 2024 | CISA adds CVE-2024-55956 to KEV catalogue |
| December 11, 2024 | Huntress publishes detailed exploitation analysis |
| December 2024 | Mass exploitation continues; Cleo releases updated advisory with clearer remediation |
| January 2025 | Clop claims responsibility; victim extortion begins |