Exploitation of CVE-2023-33246 is real and happening. That's a CVSS 9.8 for RocketMQ.
Bottom line up front, test your publicly exposed services for exploitability: https://github.com/Malayke/CVE-2023-33246_RocketMQ_RCE_EXPLOIT
The test isn't perfect, we found that it produced a false negative against a vulnerable product (version 4.8) but it successfully identified others.
TA performs scan and hits with test values, executes RCE to modify IP tables to allow SSH from attacking host (using what we believe are compromised vendor credentials - this part needs further investigation), and then hits host with a full fledged attack. Fairly thorough, we found two instances of persistence, aggressive log clean up and file clean up, and pretty decent techniques for hiding malicious commands.
All for a fucking Monero miner.
They knew what they were doing and knew this product inside and out. They knew how to try to disable protection (but couldn't on this host - shout out to Cybereason). There was no looking around, no enumeration. Just straight up scripted execution.
If you're running #Yeastar - check your shit. You have #RocketMQ running and may not know it. If you're not, check anyways. The need for #SBOM for all is so goddamn real.