CISA orders feds to patch n8n RCE flaw exploited in attacks
嗯,用户让我用中文总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。好的,我先看看这篇文章讲的是什么。 文章主要讲的是美国网络安全和基础设施安全局(CISA)下令政府机构修补一个被积极利用的n8n漏洞。n8n是一个开源的工作流自动化平台,在AI开发中很常用,用来自动化数据摄入。这个漏洞允许经过认证的攻击者在易受攻击的服务器上执行任意代码,可能导致敏感数据泄露和系统操作被篡改。 接下来,文章提到CISA已经将这个漏洞加入到已知被利用的漏洞目录中,并要求联邦机构在3月25日前修补。同时,n8n团队已经发布了修复版本,并建议管理员立即应用补丁。对于无法立即升级的管理员,可以采取一些临时措施来缓解风险。 还有,Shadowserver追踪到超过4万个未修补的实例暴露在网上,其中北美和欧洲的数量最多。此外,文章还提到n8n团队今年已经修复了多个严重漏洞。 好的,现在我需要把这些信息浓缩到100字以内。重点包括:CISA下令修补n8n漏洞,该漏洞允许远程代码执行,影响敏感数据和系统操作;CISA要求联邦机构在3月25日前完成修补;修复版本已发布;大量未修补实例暴露在线。 总结的时候要确保涵盖这些关键点,并且语言简洁明了。 </think> 美国网络安全机构CISA下令政府机构修复被积极利用的n8n漏洞(CVE-2025-68613),该漏洞允许远程代码执行并威胁敏感数据安全。修复版本已发布,但仍有大量未修补实例暴露在线。 2026-3-11 18:30:18 Author: www.bleepingcomputer.com(查看原文) 阅读量:6 收藏

n8n

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) ordered government agencies on Wednesday to patch their systems against an actively exploited n8n vulnerability.

n8n is an open-source workflow automation platform widely used in AI development for automating data ingestion, with over 50,000 weekly downloads on the npm registry and over 100 million pulls on Docker Hub.

As an automation hub, n8n often stores a wide range of highly sensitive data, including API keys, database credentials, OAuth tokens, cloud storage access credentials, and CI/CD secrets, making it an extremely attractive target for threat actors.

Tracked as CVE-2025-68613, this remote code execution vulnerability allows authenticated attackers to execute arbitrary code on vulnerable servers with the privileges of the n8n process.

"n8n contains an improper control of dynamically managed code resources vulnerability in its workflow expression evaluation system that allows for remote code execution," CISA said.

"Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations," the n8n team added.

The n8n team addressed CVE-2025-68613 in December with the release of n8n v1.122.0 and also advised IT administrators to apply the patch immediately. Admins who can't immediately upgrade can limit workflow creation and editing permissions to fully trusted users only, and restrict operating system privileges and network access as temporary mitigation measures to reduce the impact of potential exploitation.

Internet security watchdog group Shadowserver tracks over 40,000 unpatched instances exposed online, with more than 18,000 IPs found in North America and over 14,000 in Europe.

Vulnerable n8n instances exposed online
Vulnerable n8n instances exposed online (Shadowserver)

​CISA has added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog on Wednesday and ordered Federal Civilian Executive Branch (FCEB) agencies to patch their n8n instances by March 25, as mandated by a binding operational directive (BOD 22-01) issued in November 2021.

"This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise," CISA warned.

"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable."

Although BOD 22-01 applies only to federal agencies, CISA has encouraged all network defenders to secure their systems against ongoing CVE-2025-68613 attacks as soon as possible.

Since the start of the year, the n8n security team has addressed several other severe vulnerabilities, including one dubbed Ni8mare that allows remote attackers without privileges to hijack unpatched n8n servers.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-n8n-rce-flaw-exploited-in-attacks/
如有侵权请联系:admin#unsafe.sh