Hackers Quick to Exploit MOVEit Authentication Flaw


3rd Party Risk Management
,
Governance & Risk Management
,
Patch Management

Progress Software: ‘Newly Disclosed Third-Party Vulnerability Introduces New Risk’

Hackers Quick to Exploit MOVEit Authentication Flaw
It’s time for MOVEit Transfer customers to once again be on high alert for hackers. (Image: Shutterstock)

Hackers jumped on a new flaw in Progress Software’s MOVEit managed file transfer application just hours after maker Progress Software publicly disclosed the critical flaw, which allows attackers to bypass authentication.

See Also: Cybersecurity in Public Sector: 5 Insights You Need to Know

The company also disclosed a similar flaw in its Gateway proxy service meant to restrict public internet access to the transfer application.

Customers of the Massachusetts company are no strangers to emergency patching after their May 2023 experience of a mass attack on the transfer software led by Russian-speaking ransomware group Clop, which exploited a zero-day over the Memorial Day weekend (see: Known MOVEit Attack Victim Count Reaches 2,618 Organizations).

Progress Software said Tuesday it distributed on June 11 a patch for an application bypass vulnerability in the file transfer app tracked as CVE-2024-5806.

But a “newly disclosed third-party vulnerability introduces new risk,” it said.
The company urged customers to block inbound remote desktop protocol access to MOVEit servers and limit outbound connection to known, trusted…

Source…