Hertz Data Breach 2025: Cleo Vulnerability Exposes Sensitive Customer Information

Apr 22, 2025

In early 2025, Hertz Corporation disclosed a significant data breach resulting from vulnerabilities in Cleo's file-transfer software. The breach, which occurred between October and December 2024, led to unauthorized access to sensitive customer data.

Key Facts

Key Fact

Details

Breach Period

October–December 2024

Discovery Date

February 10, 2025

Data Analysis Completion

April 2, 2025

Affected Individuals

Over 3,400 residents in Maine; total number not disclosed

Compromised Data

Names, contact details, birth dates, credit card info, driver's license numbers, and in some cases, Social Security and passport numbers

Hertz's Network Status

No evidence of compromise

Regulatory Actions

Incident reported to law enforcement and regulatory authorities

Financial Impact

No immediate material effect; 2024 revenue stood at $9 billion

Technical Details

The breach exploited two critical vulnerabilities in Cleo's file-transfer products:​

  • CVE-2024-50623: An unrestricted file upload and download vulnerability

  • CVE-2024-55956: Allows unauthenticated users to execute arbitrary bash or PowerShell commands​

These vulnerabilities were part of a broader exploitation campaign attributed to the Clop ransomware group, which had previously targeted similar file-transfer systems.​

Broader Context

Hertz is among several organizations affected by the Cleo software vulnerabilities. Other companies, such as WK Kellogg and Sam's Club, have also reported incidents linked to the same flaws. The Clop ransomware group, known for its extensive cyberattack campaigns, has listed Hertz on its leak site, although it's unclear if any ransom demands were made.​

Implications

This incident underscores the risks associated with third-party software vulnerabilities, especially in widely used file-transfer systems. Organizations are advised to:​

  • Regularly update and patch third-party software

  • Monitor for unusual activity in file-transfer systems

  • Implement robust incident response plans​

Disclaimer: ClearPhish maintains a strict policy of not participating in the theft, distribution, or handling of stolen data or files. The platform does not engage in exfiltration, downloading, hosting, or reposting any illegally obtained information. Any responsibility or legal inquiries regarding the data should be directed solely at the responsible cybercriminals or attackers, as ClearPhish is not involved in these activities. We encourage parties affected by any breach to seek resolution through legal channels directly with the attackers responsible for such incidents.

Latest News

HackerOne Employee Data Breach via Navia Hack Exposes Sensitive Information

HackerOne Employee Data Breach via Navia Hack Exposes Sensitive Information

HackerOne Employee Data Breach via Navia Hack Exposes Sensitive Information

HackerOne Employee Data Breach via Navia Hack Exposes Sensitive Information

HackerOne Employee Data Breach via Navia Hack Exposes Sensitive Information

Mar 26, 2026

Firefox Introduces Free Built-In VPN with 50GB Monthly Limit

Firefox Introduces Free Built-In VPN with 50GB Monthly Limit

Firefox Introduces Free Built-In VPN with 50GB Monthly Limit

Firefox Introduces Free Built-In VPN with 50GB Monthly Limit

Firefox Introduces Free Built-In VPN with 50GB Monthly Limit

Mar 26, 2026

Microsoft Azure Monitor Alerts Abused in Callback Phishing Campaigns

Microsoft Azure Monitor Alerts Abused in Callback Phishing Campaigns

Microsoft Azure Monitor Alerts Abused in Callback Phishing Campaigns

Microsoft Azure Monitor Alerts Abused in Callback Phishing Campaigns

Microsoft Azure Monitor Alerts Abused in Callback Phishing Campaigns

Mar 23, 2026

Trivy GitHub Actions Supply Chain Attack: Infostealer Compromises CI/CD Pipelines

Trivy GitHub Actions Supply Chain Attack: Infostealer Compromises CI/CD Pipelines

Trivy GitHub Actions Supply Chain Attack: Infostealer Compromises CI/CD Pipelines

Trivy GitHub Actions Supply Chain Attack: Infostealer Compromises CI/CD Pipelines

Trivy GitHub Actions Supply Chain Attack: Infostealer Compromises CI/CD Pipelines

Mar 23, 2026

PhantomRaven npm Attack Distributes 88 Malicious Packages to Steal Developer Credentials

PhantomRaven npm Attack Distributes 88 Malicious Packages to Steal Developer Credentials

PhantomRaven npm Attack Distributes 88 Malicious Packages to Steal Developer Credentials

PhantomRaven npm Attack Distributes 88 Malicious Packages to Steal Developer Credentials

PhantomRaven npm Attack Distributes 88 Malicious Packages to Steal Developer Credentials

Mar 12, 2026

Hackers Abuse .arpa DNS and IPv6 to Evade Phishing Detection

Hackers Abuse .arpa DNS and IPv6 to Evade Phishing Detection

Hackers Abuse .arpa DNS and IPv6 to Evade Phishing Detection

Hackers Abuse .arpa DNS and IPv6 to Evade Phishing Detection

Hackers Abuse .arpa DNS and IPv6 to Evade Phishing Detection

Mar 9, 2026

Get updates in your inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Get updates in your

inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.