Progress, the company behind MOVEit Transfer, has issued a critical security alert addressing a newly discovered vulnerability in its MOVEit Transfer product.
The flaw, CVE-2024-6576, has been classified as a high-severity issue, with a CVSS score of 7.3, indicating a significant user risk.
The vulnerability found in the SFTP module of MOVEit Transfer stems from improper authentication mechanisms that could allow attackers to escalate their privileges. This issue affects several versions of MOVEit Transfer, specifically:
How to Build a Security Framework With Limited Resources IT Security Team (PDF) - Free Guide
Progress strongly recommends that all affected customers upgrade to the latest patched versions to mitigate this security risk. The table below outlines the fixed versions available for download:
Fixed Version | Documentation | Release Notes |
MOVEit Transfer 2024.0.3 (16.0.3) | Install and upgrade guide | Release Notes 2024.0 |
MOVEit Transfer 2023.1.7 (15.1.7) | Install and upgrade guide | Release Notes 2023.1 |
MOVEit Transfer 2023.0.12 (15.0.12) | Install and upgrade guide | Release Notes 2023.0 |
To upgrade, customers should:
If they have any questions or concerns, customers can open a new Technical Support case by logging into the Progress Community.
Those not under a current maintenance agreement are advised to contact the Progress Renewals team or their Progress partner account representative.
Progress emphasizes that upgrading to a patched release using the full installer is the only way to remediate this issue. Users will experience a system outage during the upgrade process.
Cloud customers, however, do not need to take any action as the cloud service has already been updated to the patched version.
Are you from SOC and DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Free Access
The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the path…
Cybercriminals are exploiting the recent critical LDAP vulnerabilities (CVE-2024-49112 and CVE-2024-49113) by distributing fake proof-of-concept…
A NonEuclid sophisticated C# Remote Access Trojan (RAT) designed for the.NET Framework 4.8 has been…
Fraudsters in the Middle East are exploiting a vulnerability in the government services portal. By…
Juniper Networks has disclosed a significant vulnerability affecting its Junos OS and Junos OS Evolved…
CrowdStrike, a leader in cybersecurity, uncovered a sophisticated phishing campaign that leverages its recruitment branding…