duo.com
Open in
urlscan Pro
13.32.27.69
Public Scan
URL:
https://duo.com/decipher/fortra-patches-actively-exploited-zero-day-in-goanywhere-mft
Submission: On February 14 via api from US — Scanned from DE
Submission: On February 14 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMGET /decipher/search
<form class="d-search__form" action="/decipher/search" method="GET" onsubmit="submitForm(); return false; " __bizdiag="0" __biza="WJ__">
<input id="input_search" class="d-search__input" type="text" placeholder="Search..." value="">
<button class="btn-magnify js-btn-magnify"><svg class="icon-magnify-thick" viewBox="0 0 512 512">
<path
d="m430 393l-114-114c13-20 22-44 22-71 0-69-56-125-126-125-69 0-125 56-125 125 0 69 56 126 125 126 27 0 51-8 71-23l115 115c4 4 10 7 16 7 6 0 12-3 16-7 9-9 9-24 0-33z m-297-185c0-43 35-78 79-78 43 0 78 35 78 78 0 44-35 79-78 79-44 0-79-35-79-79z">
</path>
</svg></button>
</form>
Text Content
* All Articles * Who We Are * * * * * Security news that informs and inspires SEARCH Feb 7, 2023 FORTRA PATCHES ACTIVELY EXPLOITED ZERO DAY IN GOANYWHERE MFT By Dennis Fisher Share Several days after news of exploit attempts against a zero day vulnerability in the GoAnywhere MFT secure file transfer tool emerged, Fortra, the tool’s maker, has released an emergency fix for the bug. Details of the attacks became public last week, and Fortra published an advisory for customers, warning them about the attacks and suggesting they deploy some mitigations and access control measures in the absence of an official patch. The vulnerability is a critical one and allows remote code injection. “A Zero-Day Remote Code Injection exploit was identified in GoAnywhere MFT. The attack vector of this exploit requires public internet access to the administrative console of the application,” the Fortra advisory says. “Due to the nature of the attack, it is critical to note that every managed credential within your GoAnywhere environment should be considered potentially compromised. This includes passwords and keys used to access any external systems with which GoAnywhere is integrated. Ensure that all credentials have been revoked from those external systems and review relevant access logs related to those systems. This also includes passwords and keys used to encrypt files within the system.” GoAnywhere MFT is a file transfer product that can be deployed in enterprise networks, as a hosted SaaS product, or on cloud platforms such as AWS. On Monday, Fortra released an emergency fix for the GoAnywhere MFT bug, which does not have a CVE identifier as of yet. “A security patch is now available in GoAnywhere MFT. This patch (7.1.2) was created as a result of the issue we disclosed in the Security Advisories published last week related to GoAnywhere MFTaaS. We urgently advise all GoAnywhere MFT customers to apply this patch,” the patch release notification says. “Particularly for customers running an admin portal exposed to the Internet, we consider this an urgent matter.” The updated version of GoAnywhere MFT is version 7.12. Zero Day Related Zero Day Fortinet FORTINET WARNS NEW CRITICAL FORTIGATE BUG HAS BEEN EXPLOITED A new critical vulnerability (CVE-2022-42475) in Fortinet's Fortigate firewall has been actively exploited. Google Zero Day GOOGLE PATCHES HEAP OVERFLOW ZERO DAY IN CHROME Google has updated Chrome on the desktop and Android to address a zero day that is being exploited in the wild. Microsoft Zero Day ATTACKERS EXPLOITING TWO MICROSOFT EXCHANGE ZERO DAYS Attackers are exploiting two new Microsoft Exchange zero days ( CVE-2022-41040 and CVE-2022-41082) in the wild. Microsoft is... * * * * All Articles Who We Are Copyright 2023 Duo Security Terms & Conditions Privacy Notice Top