
Urgent Security Alert: Critical GoAnywhere MFT Flaw Allows Admin Takeover (CVE-2024-4036)
A severe vulnerability has been discovered in Fortra’s GoAnywhere MFT (Managed File Transfer) solution, posing a significant risk to organizations that rely on the software for secure data exchange. This critical flaw, identified as CVE-2024-4036, allows an unauthenticated, remote attacker to create a new administrator account, effectively granting them full control over the system.
With a CVSS score of 9.8 out of 10.0, the vulnerability underscores the urgency for immediate action. Due to the low complexity of the attack and the lack of required user interaction or prior access, systems that have not been patched are highly exposed. All administrators of GoAnywhere MFT are strongly advised to review their systems and take immediate remedial action to prevent a potential compromise.
Understanding the GoAnywhere MFT Vulnerability
The core of this vulnerability lies in a path traversal weakness within the software’s License Response Servlet. By sending a specifically crafted web request to this endpoint, an attacker can bypass normal authentication and security checks.
The primary impact of a successful exploit is severe:
- Creation of a Malicious Administrator: An attacker can create a new user with full administrative privileges.
- Complete System Control: Once they have an admin account, the attacker can view, modify, or delete files, alter system configurations, and create or delete other user accounts.
- Potential for Further Attacks: A compromised GoAnywhere MFT instance can serve as a launchpad for broader network intrusions, data exfiltration, or the deployment of ransomware.
This vulnerability affects GoAnywhere MFT version 7.4.0 and all earlier versions. If your organization is running any of these versions, your system is currently at risk.
Immediate Steps to Secure Your System
To protect your data and infrastructure, it is crucial to take one of the following actions immediately. The primary recommendation is to upgrade, but a temporary mitigation is available if patching is not immediately possible.
1. Primary Solution: Upgrade to the Patched Version
The most effective and permanent solution is to upgrade your GoAnywhere MFT instance.
- Upgrade to GoAnywhere MFT 7.4.1 or a later version. This release contains the official patch from Fortra that fully resolves the vulnerability.
Upgrading ensures that the underlying security flaw is corrected and provides the most comprehensive protection against this and other potential threats.
2. Temporary Mitigation: If You Cannot Upgrade Immediately
If you are unable to perform an immediate upgrade, you can apply a temporary workaround to block the attack vector. This involves deleting a specific file to disable the vulnerable component.
Follow these steps carefully:
- Locate and delete the
license.jspfile from your GoAnywhere MFT installation directory. - The file is typically found in the following locations:
- For Windows:
[install_dir]\adminroot\license.jsp - For Linux:
[install_dir]/adminroot/license.jsp
- For Windows:
- After deleting the file, you must restart the GoAnywhere MFT services for the change to take effect.
Important: This mitigation should only be considered a temporary fix. It is not a substitute for applying the official security patch. You should still plan to upgrade to version 7.4.1 as soon as possible.
The Importance of Proactive Patch Management
This vulnerability is a stark reminder of the risks associated with managed file transfer solutions, which are high-value targets for cybercriminals due to the sensitive data they handle. Previous vulnerabilities in GoAnywhere MFT, such as the zero-day flaw exploited by ransomware groups in 2023, demonstrate that attackers are actively targeting these platforms.
A proactive security posture is essential. Regularly check for software updates, subscribe to security advisories from your vendors, and maintain a robust patch management program. By taking swift action on critical alerts like this one, you can significantly reduce your organization’s attack surface and protect your critical data from unauthorized access.
Source: https://www.bleepingcomputer.com/news/security/fortra-warns-of-max-severity-flaw-in-goanywhere-mfts-license-servlet/


