Thursday, April 10, 2025
HomeCVE/vulnerabilityProgress Patched New MOVEit File Transfer Flaw that Allows Privilege Escalation

Progress Patched New MOVEit File Transfer Flaw that Allows Privilege Escalation

Published on

SIEM as a Service

Follow Us on Google News

Progress, the company behind MOVEit Transfer, has issued a critical security alert addressing a newly discovered vulnerability in its MOVEit Transfer product.

The flaw, CVE-2024-6576, has been classified as a high-severity issue, with a CVSS score of 7.3, indicating a significant user risk.

CVE-2024-6576: Improper Authentication Leading to Privilege Escalation

The vulnerability found in the SFTP module of MOVEit Transfer stems from improper authentication mechanisms that could allow attackers to escalate their privileges. This issue affects several versions of MOVEit Transfer, specifically:

- Advertisement - Google News
  • From 2023.0.0 before 2023.0.12
  • From 2023.1.0 before 2023.1.7
  • From 2024.0.0 before 2024.0.3

How to Build a Security Framework With Limited Resources IT Security Team (PDF) - Free Guide

Urgent Action Required

Progress strongly recommends that all affected customers upgrade to the latest patched versions to mitigate this security risk. The table below outlines the fixed versions available for download:

Fixed VersionDocumentationRelease Notes
MOVEit Transfer 2024.0.3 (16.0.3)Install and upgrade guideRelease Notes 2024.0
MOVEit Transfer 2023.1.7 (15.1.7)Install and upgrade guideRelease Notes 2023.1
MOVEit Transfer 2023.0.12 (15.0.12)Install and upgrade guideRelease Notes 2023.0

How to Upgrade

To upgrade, customers should:

  1. Log in to the Download Center at Progress Community using their Progress ID credentials.
  2. Select the appropriate asset from the “My Active” tab list.
  3. Click the download link under the “Related Products & Downloads” section.
  4. Download the fixed version from the table above.

If they have any questions or concerns, customers can open a new Technical Support case by logging into the Progress Community.

Those not under a current maintenance agreement are advised to contact the Progress Renewals team or their Progress partner account representative.

Progress emphasizes that upgrading to a patched release using the full installer is the only way to remediate this issue. Users will experience a system outage during the upgrade process.

Cloud customers, however, do not need to take any action as the cloud service has already been updated to the patched version.

Are you from SOC and DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Free Access

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

APT32 Turns GitHub into a Weapon Against Security Teams and Enterprise Networks

Southeast Asian Advanced Persistent Threat (APT) group OceanLotus, also known as APT32, has been...

AkiraBot Floods 80,000 Sites After Outsmarting CAPTCHAs and Slipping Past Network Defenses

AkiraBot, identified by SentinelLABS, represents a sophisticated spam bot framework that targets website chats...

Microsoft Identity Web Flaw Exposes Sensitive Client Secrets and Certificates

A new vulnerability has been discovered in the Microsoft.Identity.Web NuGet package under specific conditions,...

CatB Ransomware Abuses Microsoft Distributed Transaction Coordinator for Stealthy Payload Execution

The cybersecurity realm has encountered a formidable adversary with the emergence of CatB ransomware,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

APT32 Turns GitHub into a Weapon Against Security Teams and Enterprise Networks

Southeast Asian Advanced Persistent Threat (APT) group OceanLotus, also known as APT32, has been...

AkiraBot Floods 80,000 Sites After Outsmarting CAPTCHAs and Slipping Past Network Defenses

AkiraBot, identified by SentinelLABS, represents a sophisticated spam bot framework that targets website chats...

Microsoft Identity Web Flaw Exposes Sensitive Client Secrets and Certificates

A new vulnerability has been discovered in the Microsoft.Identity.Web NuGet package under specific conditions,...