Dec 15, 2023
Nov 20, 2025
Kat Desy
Written by: Ferhat Dikbiyik
Additional Contributions: Ferdi Gül and Yavuz Han
Edited by: Katherine Desy
Welcome to another edition of Focus Friday, where we delve into the latest cyber threats and their implications for Third-Party Risk Management (TPRM). This week, we focus on a diverse range of critical cybersecurity issues: the Volt Typhoon campaign targeting US infrastructures, a concerning Remote Code Execution vulnerability in the popular WordPress plugin Elementor, and a newly discovered path traversal vulnerability in MLflow, an open-source machine learning platform. These developments highlight the ever-evolving landscape of cyber threats that TPRM professionals must navigate. Our discussion will shed light on the nature of these threats, their potential impacts, and how Black Kite’s Focus Tags™ provide vital insights for effective risk management strategies. Join us as we explore these pressing issues and their ramifications for cybersecurity and TPRM practices.

The Volt Typhoon Campaign, making headlines recently for its elevated cyber attacks, is a significant threat in the realm of cybersecurity. Volt Typhoon, identified as a state-sponsored threat actor by several international cybersecurity authorities, including CISA, FBI, and NSA, represents a sophisticated and stealthy cyber-espionage campaign. Active since at least 2021, this campaign, linked to the People’s Republic of China, has been targeting critical infrastructure organizations across the United States, including Guam.
The campaign is notorious for focusing on stealth, employing living-off-the-land (LOTL) techniques and hands-on-keyboard activity to evade detection. LOTL techniques leverage legitimate networking tools preloaded onto operating systems, while hands-on-keyboard activity involves manual command execution by human attackers on compromised systems. These methods allow the Volt Typhoon to blend into normal network activity and maintain access for extended periods without detection.
Key vulnerabilities exploited by the Volt Typhoon include CVE-2022-47966 and CVE-2022-42475. CVE-2022-47966, found in Zoho ManageEngine ServiceDesk Plus, enables remote code execution, allowing attackers to gain unauthorized access and establish persistence within networks. CVE-2022-42475, associated with Fortinet FortiGuard devices, has also been exploited to gain access and compromise network security. The broad range of targeted sectors, including communications, manufacturing, utilities, and government, highlights the campaign’s extensive reach and the critical need for heightened cybersecurity vigilance.
Recent heightened media coverage of these attacks underscores the urgency and importance of addressing this sophisticated cyber threat, particularly for organizations within these critical infrastructure sectors. The targeted sectors span communications, manufacturing, utilities, transportation, construction, maritime, government, IT, and education, illustrating the campaign’s broad scope and potential impact.
The Volt Typhoon campaign’s focus on critical infrastructure sectors makes it a pivotal concern for Third-Party Risk Management (TPRM) professionals. The sophisticated nature of this state-sponsored campaign, along with its exploitation of vulnerabilities in widely used products like FortiOS and Zoho ManageEngine ServiceDesk Plus, places a significant number of third-party vendors at risk. TPRM professionals must recognize the potential for these vulnerabilities to be exploited not just for data theft, but for sustained, undetected access to their networks.
The campaign’s usage of advanced techniques, such as living-off-the-land (LOTL) and hands-on-keyboard activities, adds complexity to detecting and mitigating these threats. Since these methods involve the use of legitimate tools and manual command executions, they can easily blend into regular network activities, making early detection challenging.
Furthermore, the campaign’s broad targeting across various sectors amplifies its impact. TPRM professionals should be especially vigilant if their vendor network includes organizations in communications, manufacturing, utilities, transportation, and government sectors. Given the campaign’s focus on stealth and persistence, it’s crucial for TPRM teams to ensure that their vendors not only patch known vulnerabilities but also implement comprehensive monitoring and response strategies to identify and mitigate any potential breaches.
The recent spike in media attention around these attacks serves as a reminder of the evolving nature of cyber threats and the need for TPRM professionals to continuously adapt their strategies to safeguard their supply chains against such sophisticated adversaries.
In the context of the Volt Typhoon campaign, TPRM professionals should ask targeted, technical questions to vendors, especially those using FortiOS or Zoho ManageEngine ServiceDesk Plus. These questions are designed to assess the vendors’ awareness, preparedness, and response strategies related to this campaign and its exploited vulnerabilities:
These questions aim to gauge the vendors’ level of vigilance and preparedness against the sophisticated tactics employed by the Volt Typhoon and ensure that they are actively working to secure their networks against such advanced threats.
For vendors potentially impacted by the Volt Typhoon campaign, especially those using FortiOS or Zoho ManageEngine ServiceDesk Plus, specific technical remediation recommendations are essential:
FortiOS (CVE-2022-42475):
Zoho ManageEngine ServiceDesk Plus (CVE-2022-47966):
ManageEngine ADSelfService Plus (CVE-2021-40539):
These remediation steps are critical in protecting against the sophisticated techniques employed in the Volt Typhoon campaign, thereby enhancing the overall security posture of the affected vendors.
In the wake of the Volt Typhoon campaign, leveraging Black Kite’s capabilities becomes crucial for an effective TPRM strategy. Black Kite initially applied the “APT Risk: FortiOS/Zoho” tag in September, and the tag has been recently updated to reflect the latest developments in this campaign. This tag is instrumental in identifying vendors using either FortiOS or Zoho ManageEngine ServiceDesk Plus, which are at heightened risk due to the campaign.

Here’s how Black Kite supports TPRM professionals:
By harnessing these features, Black Kite users can effectively identify and prioritize the vendors most susceptible to this campaign, streamline their risk management efforts, and ensure robust defenses against sophisticated nation-state threats like the Volt Typhoon.
CVE-2023-48777 is a critical vulnerability in the Elementor plugin for WordPress, impacting nearly 5 million sites using the plugin. Discovered this week, this vulnerability allows authenticated users with Contributor-level access or higher to execute remote code via file upload through the template import functionality of Elementor. Specifically, it affects all versions up to and including 3.18.1, with a CVSS score of 8.8 (High).
The vulnerability originates from the handle_elementor_upload function within the Elementor AJAX function import_template, which is accessible to Contributor-level users. This function, despite using file type validation, saves the uploaded file to a temporary directory before checking its type and does not delete it if validation fails. Consequently, attackers can upload files of any type, which are then stored in a temporary directory with a randomized name. Exploiting this vulnerability enables attackers to upload malicious files and execute code on the server, potentially compromising the site.
Elementor released a patch in version 3.18.2 on December 8, 2023, to address this vulnerability. However, the initial patch in version 3.18.1 was deemed insufficient, prompting the release of the updated version. The severity of this vulnerability, combined with the widespread use of the Elementor plugin, underscores the need for immediate action by website administrators to update to the fully patched version and review their site’s security posture
The critical vulnerability CVE-2023-48777 in the Elementor WordPress plugin poses a substantial risk that TPRM professionals must urgently address. Elementor’s widespread use heightens the risk of this Remote Code Execution (RCE) vulnerability, especially considering the potential for attackers to take over websites. Such a breach could lead to the alteration of important information on vendor websites or the insertion of malicious code. This not only compromises the integrity of the website but also poses a direct threat to clients interacting with these compromised sites.
In addressing the vulnerability CVE-2023-48777 within the Elementor plugin, TPRM professionals should pose specific, technically oriented questions to their vendors:
Vendors impacted by the CVE-2023-48777 vulnerability in the Elementor WordPress plugin should urgently undertake the following remediation steps:
The recent publication of the “File Upload / Remote Code Execution Vulnerabilities in Elementor plugin” tag by Black Kite offers TPRM professionals a vital tool in addressing the risks associated with CVE-2023-48777. This tag, providing detailed information about the exact Elementor versions used by vendors and the specific IT assets affected, is essential for effective communication and risk management.

Here’s how Black Kite aids in this situation:
Leveraging Black Kite in this context ensures a more focused and effective TPRM strategy, enabling professionals to mitigate the risks posed by CVE-2023-48777 efficiently and protect their digital ecosystem from potential threats.
MLflow, an open-source platform widely used in the machine learning lifecycle, recently encountered a critical vulnerability, CVE-2023-6753. This vulnerability, classified as a path traversal flaw, was identified in versions of MLflow prior to 2.9.2. If exploited, it could allow attackers to access or modify files outside of the restricted directories on the server, posing serious security risks. Given the recent advancements in large language models (LLMs) and the increasing adoption of platforms like MLflow, understanding and mitigating this vulnerability becomes crucial, especially considering almost 1000 organizations, most in the US, use MLflow according to our research on internet-wide scanners like Shodan.
From a TPRM perspective, the CVE-2023-6753 vulnerability in MLflow is particularly concerning due to the platform’s growing popularity in data science and machine learning fields. For TPRM professionals, it’s vital to assess whether vendors in their network are using vulnerable versions of MLflow. If exploited, this vulnerability could lead to unauthorized access to sensitive data, potentially compromising the integrity and confidentiality of machine learning projects.
Vendors using MLflow should take the following steps:
With the introduction of the “MLflow” tag, Black Kite users can effectively identify and manage the risks associated with CVE-2023-6753. The tag provides use of MLflow by vendors and the exact IT assets affected, enabling targeted risk assessments and precise vendor communication.
Black Kite’s Focus Tags™ play an indispensable role in refining Third-Party Risk Management (TPRM) approaches, especially in light of recent vulnerabilities and threats like the Volt Typhoon campaign, WordPress Elementor RCE, and MLflow path traversal issues. These tags provide:
Black Kite’s Focus Tags™, tailored to recent cybersecurity developments, empower TPRM professionals with actionable insights, fostering more effective and proactive risk management tailored to the unique challenges of the current digital threat environment.
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-250a
https://www.tenable.com/blog/volt-typhoon-cybersecurity-advisory
https://www.securityweek.com/chinese-apt-volt-typhoon-linked-to-unkillable-soho-router-botnet/
https://www.manageengine.com/security/advisory/CVE/cve-2022-47966.html
https://www.fortiguard.com/psirt/FG-IR-22-398
https://patchstack.com/articles/critical-vulnerability-in-elementor-affecting-5-million-websites/
https://nvd.nist.gov/vuln/detail/CVE-2023-6753
https://github.com/mlflow/mlflow/commit/1c6309f884798fbf56017a3cc808016869ee8de4