Article Details
Scrape Timestamp (UTC): 2025-09-19 14:39:36.285
Source: https://www.theregister.com/2025/09/19/gortra_goanywhere_bug/
Original Article Text
Click to Toggle View
Ding ding: Fortra rings the perfect-10 bell over latest GoAnywhere MFT bug. Outside experts say the vulnerability has probably already been exploited. Budding ransomware crooks have another shot at exploiting Fortra's GoAnywhere MFT product now that a new 10/10 severity vulnerability needs patching. The vendor issued an advisory for CVE-2025-10035 on Thursday, saying successful exploitation can potentially lead to command injection. Fortra's advisory states "a deserialization vulnerability in the License Servlet of Fortra's GoAnywhere MFT allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection." It comes more than two years after the vendor issued patches for CVE-2023-0669 (7.2) – a similar vulnerability affecting the License Servlet of GoAnywhere MFT as a Service, also leading to command injection. Reg readers may remember the vulnerability being exploited by criminals working for LockBit and Black Basta – two of the most prolific ransomware crews of their time. Months after discovering the flaw in January 2023, Fortra's own assessment confirmed CVE-2023-0669 was exploited as a zero-day between January 18-31, 2023, by unspecified attackers. Customers were contacted directly and urged to rotate all keys, master keys, and credentials, and scan logs for suspicious admin accounts that should be deleted. This time around, Fortra is encouraging customers to either upgrade to a patched version – either the latest release, 7.8.4, or the Sustain Release 7.6.3 – or to apply the mitigation, which involves ensuring the product's admin console isn't publicly exposed to the web. "Exploitation of this vulnerability is highly dependent upon systems being externally exposed to the internet," it said in the advisory. Fortra did not confirm whether or not it was aware of the vulnerability already being exploited in the wild. However, watchTowr Xeeted about the bug, saying "in-the-wild exploitation is likely. Patch now." The researchers at the ever-snarky security shop also noted that the exploitation path for the latest vulnerability is the same as the one used to pop CVE-2023-0669. Almost a year to the day after Fortra alerted the world to CVE-2023-0669, researchers at Horizon3 developed a working exploit for a separate critical bug in GoAnywhere MFT (CVE-2024-0204, 9.8). At the heart of this bug was a classic path traversal affecting Tomcat-based applications – the type of vulnerability CISA has previously tried to peer-pressure vendors from enabling. Managed file transfer apps are always hot targets for cybercriminals, given the access to data they can provide, which if stolen can be used for extortion. For instance, Cl0p's infamous attack on Progress's MOVEit MFT solution in 2023 ultimately led to thousands of organizations being breached, and the data belonging to nearly 96 million people being compromised, per Emsisoft's tracker.
Daily Brief Summary
Fortra has disclosed a critical vulnerability, CVE-2025-10035, in its GoAnywhere MFT product, rated 10/10 in severity, potentially leading to command injection attacks.
The flaw lies in the deserialization process within the License Servlet, allowing attackers to execute arbitrary commands if they forge a valid license response signature.
This vulnerability follows a similar issue, CVE-2023-0669, which was exploited by ransomware groups like LockBit and Black Basta, highlighting ongoing risks.
Fortra advises customers to upgrade to patched versions 7.8.4 or 7.6.3, or ensure the admin console is not exposed to the internet to mitigate risks.
While Fortra has not confirmed active exploitation, security researchers warn that exploitation in the wild is likely, urging immediate patching.
Managed file transfer applications remain prime targets for cybercriminals due to their potential access to sensitive data, underscoring the importance of timely patch management.
The incident serves as a reminder of the critical need for robust security practices and proactive vulnerability management in software solutions.