1080*80 ad

GoAnywhere Zero-Day Exploit (CVE-2025-10035) Used in Attacks

Critical GoAnywhere Vulnerability (CVE-2023-0669): Protect Your Systems Now

A severe zero-day vulnerability in Fortra’s GoAnywhere MFT (Managed File Transfer) software is being actively exploited in the wild, leading to significant data breaches across numerous organizations. This critical flaw, tracked as CVE-2023-0669, allows attackers to gain initial access to corporate networks, steal sensitive data, and deploy ransomware.

If your organization uses GoAnywhere MFT, immediate action is required to prevent a potentially devastating security incident.

What is the GoAnywhere MFT Vulnerability?

The vulnerability is a pre-authentication remote code execution (RCE) flaw found in the administrative console of the GoAnywhere MFT solution. In simple terms, this means an attacker can execute malicious code on a vulnerable server without needing any login credentials.

The flaw is particularly dangerous because it targets the web-based admin portal, which, in many cases, has been improperly exposed to the public internet. Once exploited, attackers gain complete control over the system, enabling them to exfiltrate files and move laterally across the victim’s network.

Threat Actors and Widespread Impact

Security researchers have linked the active exploitation of this vulnerability to notorious cybercrime syndicates, including the Clop (or Cl0p) ransomware gang. This group is known for leveraging large-scale data theft from file transfer solutions for widespread extortion campaigns.

The attacks are not targeted at a specific industry; any organization using a vulnerable, internet-facing GoAnywhere MFT instance is at risk. Attackers are systematically scanning the internet for unpatched systems and launching automated attacks. The consequences of a successful breach include:

  • Massive data exfiltration of sensitive corporate, employee, and customer information.
  • Extortion attempts, where threat actors demand payment to prevent the public release of stolen data.
  • Significant operational disruption and reputational damage.

Actionable Steps to Secure Your GoAnywhere MFT Instance

To protect your organization from this active threat, your security and IT teams must take immediate and decisive action.

1. Apply the Security Patch Immediately

Fortra has released an emergency patch to address this vulnerability. The primary and most crucial step is to update your GoAnywhere MFT software to version 7.1.2 or later. This version contains the necessary fix to close the security loophole and prevent exploitation. Delaying this patch leaves your organization exposed.

2. Restrict Access to the Administrative Console

As a critical security best practice, the administrative console should never be exposed to the public internet. If you cannot patch your system immediately, implement the following mitigation steps:

  • Ensure the admin portal (typically on ports 8000 and 8001) is firewalled off from the internet.
  • Only allow access to the administrative console from a trusted, internal network.
  • If remote access is necessary, it should be done exclusively through a secure VPN connection.

3. Hunt for Indicators of Compromise (IoCs)

Your security team should proactively investigate for any signs that your system may have already been compromised. Review server logs for suspicious activity, such as:

  • Unusual log entries or error messages related to the administrative console.
  • Unexpected creation of new user accounts, particularly in the webapps/goanywhere/users directory.
  • Evidence of new files or suspicious processes running on the server.

Staying ahead of threats like CVE-2023-0669 requires a proactive approach to vulnerability management. Ensure your organization has a robust patching policy and a defense-in-depth security strategy to protect your most critical assets from determined attackers.

Source: https://www.helpnetsecurity.com/2025/09/26/fortra-goanywhere-zero-day-cve-2025-10035/

900*80 ad

      1080*80 ad