Article - CS423215

Is Windchill affected by "High Profile Vulnerability Alert - Polyfill supply chain attack"

Modified: 24-Jul-2024   


Applies To

  • Windchill PDMLink 11.1 to 13.0

Description

  • Is Windchill affected by High Profile Vulnerability Alert - Polyfill supply chain attack?

High Profile Vulnerability Alert – Polyfill supply chain attack

 

Vulnerability Details

DescriptionThe JavaScript library Polyfill, essential for older browser support, was compromised on June 25, 2024, impacting over 110,000 websites, including but not limited to JSTOR and Intuit. In February 2024, the polyfill.io domain was acquired by the suspicious company Funnull from China that later proceeded with embedding malware through cdn.polyfill.io, redirecting users to fraudulent sites.  Sansec's analysis revealed the malware has targeted mobile users, avoiding detection by administrative accounts and web analytics. Google has suspended Ads accounts linked to the malicious 'googie-analytics' redirect, other domains have surfaced performing similar actions. . Polyfill's creator, Andrew Betts, urges developers abandoning the library, recommending alternatives from Fastly and Cloudflare for necessary functionality.
Exploit AvailabilityThe malicious malware code embedded in the hijacked library redirects users to fraudulent sites, bookmakers, and online casinos.
ReferencesPolyfill supply chain attack hits 100k+ sites
This is a printer-friendly version of Article 423215 and may be out of date. For the latest version click CS423215