duo.com Open in urlscan Pro
13.32.27.69  Public Scan

URL: https://duo.com/decipher/fortra-patches-actively-exploited-zero-day-in-goanywhere-mft
Submission: On February 14 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

GET /decipher/search

<form class="d-search__form" action="/decipher/search" method="GET" onsubmit="submitForm(); return false; " __bizdiag="0" __biza="WJ__">
  <input id="input_search" class="d-search__input" type="text" placeholder="Search..." value="">
  <button class="btn-magnify js-btn-magnify"><svg class="icon-magnify-thick" viewBox="0 0 512 512">
      <path
        d="m430 393l-114-114c13-20 22-44 22-71 0-69-56-125-126-125-69 0-125 56-125 125 0 69 56 126 125 126 27 0 51-8 71-23l115 115c4 4 10 7 16 7 6 0 12-3 16-7 9-9 9-24 0-33z m-297-185c0-43 35-78 79-78 43 0 78 35 78 78 0 44-35 79-78 79-44 0-79-35-79-79z">
      </path>
    </svg></button>
</form>

Text Content

 * All Articles
 * Who We Are
 * * 
   * 
   * 
   * 


Security news that informs and inspires


SEARCH





Feb 7, 2023


FORTRA PATCHES ACTIVELY EXPLOITED ZERO DAY IN GOANYWHERE MFT

By Dennis Fisher
Share

Several days after news of exploit attempts against a zero day vulnerability in
the GoAnywhere MFT secure file transfer tool emerged, Fortra, the tool’s maker,
has released an emergency fix for the bug.

Details of the attacks became public last week, and Fortra published an advisory
for customers, warning them about the attacks and suggesting they deploy some
mitigations and access control measures in the absence of an official patch. The
vulnerability is a critical one and allows remote code injection.

“A Zero-Day Remote Code Injection exploit was identified in GoAnywhere MFT. The
attack vector of this exploit requires public internet access to the
administrative console of the application,” the Fortra advisory says.

“Due to the nature of the attack, it is critical to note that every managed
credential within your GoAnywhere environment should be considered potentially
compromised. This includes passwords and keys used to access any external
systems with which GoAnywhere is integrated. Ensure that all credentials have
been revoked from those external systems and review relevant access logs related
to those systems. This also includes passwords and keys used to encrypt files
within the system.”

GoAnywhere MFT is a file transfer product that can be deployed in enterprise
networks, as a hosted SaaS product, or on cloud platforms such as AWS.

On Monday, Fortra released an emergency fix for the GoAnywhere MFT bug, which
does not have a CVE identifier as of yet.

“A security patch is now available in GoAnywhere MFT. This patch (7.1.2) was
created as a result of the issue we disclosed in the Security Advisories
published last week related to GoAnywhere MFTaaS. We urgently advise all
GoAnywhere MFT customers to apply this patch,” the patch release notification
says.

“Particularly for customers running an admin portal exposed to the Internet, we
consider this an urgent matter.”

The updated version of GoAnywhere MFT is version 7.12.

Zero Day

Related

Zero Day Fortinet


FORTINET WARNS NEW CRITICAL FORTIGATE BUG HAS BEEN EXPLOITED

A new critical vulnerability (CVE-2022-42475) in Fortinet's Fortigate firewall
has been actively exploited.

Google Zero Day


GOOGLE PATCHES HEAP OVERFLOW ZERO DAY IN CHROME

Google has updated Chrome on the desktop and Android to address a zero day that
is being exploited in the wild.

Microsoft Zero Day


ATTACKERS EXPLOITING TWO MICROSOFT EXCHANGE ZERO DAYS

Attackers are exploiting two new Microsoft Exchange zero days ( CVE-2022-41040
and CVE-2022-41082) in the wild. Microsoft is...

 * 
 * 
 * 
 * 

All Articles Who We Are
Copyright 2023 Duo Security
Terms & Conditions Privacy Notice
Top