Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Fixed exploit attempts against the new MOVEit transfer vulnerability
Global Security

Fixed exploit attempts against the new MOVEit transfer vulnerability

AdminBy AdminJuly 8, 2024No Comments4 Mins Read
MOVEit Transfer Vulnerability
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


June 26, 2024Information hallVulnerability / Data Protection

MOVEit Transmission Vulnerability

A recently discovered critical security flaw affecting Progress Software MOVEit Transfer is already being observed attempts at exploitation in the wild shortly after details of the error were revealed publicly.

The vulnerability, noted as CVE-2024-5806 (CVSS score: 9.1), concerns an authentication bypass that affects the following versions:

  • From 2023.0.0 to 2023.0.11
  • From 2023.1.0 to 2023.1.6 and
  • From 2024.0.0 to 2024.0.2

“An incorrect authentication vulnerability in Progress MOVEit Transfer (SFTP module) could allow authentication to be bypassed,” the company said in a statement. said in an advisory issued Tuesday.

Cyber ​​security

There is also progress addressed another critical authentication bypass vulnerability related to SFTP (CVE-2024-5805, CVSS score: 9.1) affecting MOVEit Gateway version 2024.0.0.

Successful exploitation of the flaws could allow an attacker to bypass SFTP authentication and gain access to the MOVEit Transfer and Gateway systems.

watchTowr Labs has since released more technical details about CVE-2024-5806, with security researchers Alise Hammond and Sina Heirkach noting that it could be a weapon to impersonate any user on the server.

The cybersecurity company went on to describe the flaw as two separate vulnerabilities, one in Progress MOVEit and one in the IPWorks SSH library.

“While the more disruptive vulnerability, the ability to impersonate arbitrary users, is unique to MOVEit, the less impactful (but still very real) forced authentication vulnerability will likely affect all applications that use the IPWorks SSH server “, – researchers. said.

Progress Software said the flaw in the third-party component “increases the risk of an underlying problem” if not fixed, urging customers to take the following two steps –

  • Block public RDP inbound access to the MOVEit transfer server(s).
  • Restrict outbound access to only known trusted endpoints from the MOVEit transfer server(s)

According to Rapid7, there is three prerequisites before exploit CVE-2024-5806: Attackers need to know an existing username, the target account can authenticate remotely, and the SFTP service is publicly available over the Internet.

Cyber ​​security

As of June 25, data collected by Censys shows that there are about 2,700 instances of MOVEit Transfer online, most of them in the US, UK, Germany, Netherlands, Canada, Switzerland, Australia, France, Ireland and Denmark.

Another important issue in MOVEit Transfer widely abused in a series of Cl0p ransomware attacks last year (CVE-2023-34362CVSS score: 9.8), it is very important that users move quickly to upgrade to the latest versions.

The development comes after the US Cybersecurity and Infrastructure Security Agency (CISA) revealed that its Chemical Security Assessment Tool (CSAT) was targeted earlier this January by an unknown threat actor using security flaws in the Ivanti Connect Secure (ICS) appliance (CVE-2023-46805, CVE-2024-21887, and CVE-2024-21893).

“This intrusion could have resulted in potential unauthorized access to top screen surveys, security vulnerability assessments, site security plans, personal security programs (PSPs), and CSAT user accounts,” the agency noted. saidadding that no evidence of data theft was found.

Update

In a statement released to The Hacker News, Progress Software said, “We have not received any reports that these vulnerabilities have been exploited, and we are not aware of any direct operational impact to customers.”

“We have already fixed the issue and are working to notify and advise affected customers of the impact,” Gent Heath, president and CEO of /n software, which supports IPWorks SSH, told the publication.

“The extent of the vulnerability depends on how developers use the component, and we expect it to be limited. It’s worth noting that the security researchers notified us just 24 hours before Monday’s release, when they’ve known and worked on it for weeks – which is unfortunate.”

/n software Provides information about CVE-2024-5806

The manufacturer IPWorks SSH has noted in the warning that bypassing authentication occurs only “after the developer has accepted the user’s credentials without validation.” It also says that as part of the library update, all unintended file and network access requests are prevented.

(The story has been updated after publication to emphasize that the attacks are exploitation attempts at this stage.)

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.