Critical Authentication Bypass Flaw in MOVEit Transfer Under Active Exploitation

by | Jun 27, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

Threat actors are swiftly exploiting a newly discovered critical authentication bypass flaw in Progress MOVEit Transfer, less than a day after the vendor disclosed the vulnerability.

MOVEit Transfer is a managed file transfer (MFT) solution widely used in enterprise environments for secure file transfers between business partners and customers over SFTP, SCP, and HTTP protocols.

The critical flaw, identified as CVE-2024-5806, allows attackers to bypass authentication in the Secure File Transfer Protocol (SFTP) module, which handles file transfers over SSH. Exploiting this vulnerability, attackers can access sensitive data on the MOVEit Transfer server, upload, download, delete, or modify files, and intercept or tamper with file transfers.

Exploit Code in the Wild

The Shadowserver Foundation, a threat monitoring platform, reported that exploitation attempts began almost immediately after Progress published the bulletin on CVE-2024-5806. Hackers are actively targeting vulnerable endpoints.

https://x.com/Shadowserver/status/1805676078620401831

Network scans by Censys show approximately 2,700 internet-exposed MOVEit Transfer instances, primarily in the US, UK, Germany, Canada, and the Netherlands. However, the number of instances that haven’t applied the necessary security updates or mitigations remains unknown.

Internet-exposed MOVEit Transfer instancesInternet-exposed MOVEit Transfer instances
Source: Censys

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Shadowserver’s report follows the release of technical details about the vulnerability by the offensive security company watchTowr. They provided a thorough analysis of how attackers can manipulate SSH public key paths to force the server to authenticate using attacker-controlled paths, potentially exposing Net-NTLMv2 hashes.

Additionally, proof-of-concept exploit code for CVE-2024-5806 is publicly available from watchTowr and vulnerability researchers Sina Kheirkhah and Aliz Hammond. This public availability is likely to accelerate the pace of attacks, making it crucial for organizations to apply the related security updates and mitigations immediately.

Patches for CVE-2024-5806

Progress has released patches for the following affected MOVEit Transfer versions:

  • 2023.0.0 before 2023.0.11
  • 2023.1.0 before 2023.1.6
  • 2024.0.0 before 2024.0.2

These fixes are available on the Progress Community portal. Customers without a current maintenance agreement should contact the Renewals team or their Progress partner representative to resolve the issue promptly.

MOVEit Cloud customers do not need to take any action, as patches have already been automatically deployed.




Additional Risks and Mitigations

Beyond CVE-2024-5806, Progress identified another vulnerability in a third-party component used in MOVEit Transfer, increasing the risks associated with the primary flaw.

Until a fix from the third-party vendor is available, system administrators are advised to block Remote Desktop Protocol (RDP) access to MOVEit Transfer servers and restrict outbound connections to known and trusted endpoints.

Progress also issued a security bulletin regarding a similar authentication bypass issue, CVE-2024-5805, impacting MOVEit Gateway 2024.0.0.

Given MOVEit’s extensive use in enterprise environments, hackers closely monitor vulnerabilities and available exploits for the product, particularly after the Clop ransomware group exploited a zero-day flaw last year to breach and extort thousands of organizations.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This