MOVEit Transfer Critical Vulnerability - Now Exploited!
- Chris Yarbrough

- Jun 26, 2024
- 2 min read
In June 2024, a critical (9.1 CVSS) security vulnerability in the MOVEit Transfer software was disclosed, sparking immediate concern in the cybersecurity community. This critical flaw, identified as CVE-2024-5806, allows threat actors to bypass authentication mechanisms, thereby compromising the integrity and security of data transferred using MOVEit Transfer.
What is MOVEit Transfer?
MOVEit Transfer is a managed file transfer (MFT) solution widely used in enterprise environments for securely transferring files between business partners and customers via SFTP, SCP, and HTTP protocols. The software is designed to handle sensitive data and ensure secure file transfer operations.
The Nature of the Vulnerability
CVE-2024-5806 is an authentication bypass vulnerability located in the Secure File Transfer Protocol (SFTP) module of MOVEit Transfer. The flaw allows attackers to exploit the system by bypassing authentication processes, which can lead to unauthorized access to sensitive data, and the ability to upload, download, delete, or modify files, as well as intercept or tamper with ongoing file transfers.
Exploitation in the Wild
Less than a day after the disclosure, reports emerged of active exploitation attempts. According to the Shadowserver Foundation, hackers are already scanning for vulnerable MOVEit Transfer instances exposed on the internet. This swift response from the hacker community underscores the critical nature of the vulnerability and the urgency for affected organizations to act.
Impact and Scope
The vulnerability impacts multiple versions of MOVEit Transfer:
Versions from 2023.0.0 before 2023.0.11
Versions from 2023.1.0 before 2023.1.6
Versions from 2024.0.0 before 2024.0.2
A separate but related vulnerability, CVE-2024-5805, affects MOVEit Gateway 2024.0.0. Both vulnerabilities stem from issues in the IPWorks SSH library, which is used by MOVEit Transfer, further complicating the security landscape for users of this software.
Technical Details and Analysis
The vulnerability leverages two main issues:
Impersonation of Arbitrary Users: This aspect allows an attacker to gain access as any user on the server, significantly increasing the risk of data breaches.
Forced Authentication Bypass: This impacts any application using the IPWorks SSH server, making it a broader issue beyond just MOVEit Transfer.
Mitigation and Patching
Progress Software, the developer behind MOVEit Transfer, has released patches to address these vulnerabilities. The updates are available in the following versions:
MOVEit Transfer 2023.0.11
MOVEit Transfer 2023.1.6
MOVEit Transfer 2024.0.2
To mitigate the risk until patches can be applied, Progress Software advises users to block public inbound Remote Desktop Protocol (RDP) access to MOVEit Transfer servers and limit outbound access to known, trusted endpoints only.
Recommendations
Organizations using MOVEit Transfer should prioritize applying the necessary patches immediately to mitigate the risks associated with CVE-2024-5806. Additionally, continuous monitoring for signs of exploitation and adhering to the recommended security practices provided by Progress Software are crucial steps to ensure data security.
Conclusion
The MOVEit Transfer vulnerability CVE-2024-5806 represents a significant threat due to its ability to bypass authentication and the immediate exploitation observed in the wild. Prompt action by organizations to patch and secure their systems is essential in defending against potential data breaches and maintaining the integrity of their file transfer operations.
For more detailed technical insights and updates, refer to the following security advisories and bulletins released by Progress Software and other cybersecurity resources:




Comments