Over 400 IPs Exploiting Multiple SSRF Vulnerabilities – A Coordinated Cyber Offensive
Custodian360
Custodian360: Fully Managed Cybersecurity by Our UK-Based SOC. Trusted Protection, Proactive Solutions #MSSP
A significant wave of Server-Side Request Forgery (SSRF) attacks has been detected across multiple platforms, with at least 400 unique IPs actively exploiting multiple SSRF CVEs. The scale and structured nature of this campaign suggest automation, coordinated attack planning, and possibly pre-compromise intelligence gathering.
The Nature of SSRF and Why It’s Dangerous
SSRF is a highly exploitable web security vulnerability that allows attackers to manipulate server-side requests. By exploiting SSRF, adversaries can:
Given the growing reliance on cloud services and internal metadata APIs, SSRF remains one of the most dangerous attack vectors in modern enterprise environments.
Coordinated Exploitation Across Multiple Platforms
GreyNoise, a leading threat intelligence firm, has confirmed that these 400+ IPs are not only engaging in widespread exploitation but also targeting multiple SSRF vulnerabilities concurrently. This behavior indicates a high degree of automation, with attackers deploying scripts or botnets to maximize attack surface coverage.
Affected CVEs
The vulnerabilities under active exploitation span various platforms, including enterprise collaboration suites, cloud management tools, and application frameworks:
CVECVSS ScoreAffected Software
CVE-2017-09297.5DotNetNuke
CVE-2020-77969.8Zimbra Collaboration Suite
CVE-2021-219735.3VMware vCenter
CVE-2021-220547.5VMware Workspace ONE UEM
CVE-2021-221759.8GitLab CE/EE
CVE-2021-222148.6GitLab CE/EE
CVE-2021-399357.5GitLab CE/EE
CVE-2023-58309.8ColumbiaSoft DocumentLocator
CVE-2024-65877.5BerriAI LiteLLM
CVE-2024-218938.2Ivanti Connect SecureOpenBMCS 2.4(No CVE)OpenBMCS Authenticated SSRFZimbra Suite(No CVE)Zimbra SSRF Exploit
Observed Attack Patterns
The attack telemetry shows that the targeted systems belong to high-profile organizations across multiple regions, including the United States, Germany, Singapore, India, Lithuania, Japan, and Israel. Notably, Israel saw a surge in attacks on March 11, 2025.
The attack methodology appears to follow a predictable cycle:
Defensive Strategies Against SSRF Exploits
With SSRF actively exploited at scale, organizations must prioritize proactive mitigation measures:
1. Patch and Update Vulnerable Systems
Ensure that all systems are running the latest patches for affected software. Many of the exploited CVEs have security updates available, but unpatched systems remain an easy target.
2. Restrict Outbound Connections
3. Enforce Strong IAM Controls
4. Implement Web Application Firewalls (WAFs)
A WAF with SSRF-specific rules can help mitigate malicious HTTP requests, blocking suspicious payloads before they reach the backend servers.
5. Monitor and Detect SSRF Attacks
Conclusion
The surge in SSRF exploitation across multiple vulnerabilities is a clear signal that adversaries are refining their tactics. The sheer scale—400+ IPs targeting multiple CVEs simultaneously—suggests structured, automated, and large-scale exploitation.
Organizations must act swiftly to mitigate these risks by patching vulnerabilities, implementing network restrictions, and monitoring outbound requests for suspicious activity. With cloud services increasingly reliant on internal metadata APIs, securing against SSRF-based reconnaissance and credential theft is more critical than ever.
Call to Action
Have you assessed your exposure to SSRF vulnerabilities? What steps are you taking to defend against these threats? Let’s discuss best practices for mitigating large-scale coordinated cyberattacks in the comments.