Threat Intelligence logo

Security Alert: Critical MOVEit Vulnerabilities Exposed

Threat Intelligence • June 28, 2024

Background

Recently, significant vulnerabilities have been discovered in the MOVEit Transfer and MOVEit Gateway products, posing serious risks to data security. These vulnerabilities, tracked as CVE-2024-5805 and CVE-2024-5806, could potentially allow unauthorized access and data breaches. 


This discovery follows the major breach in May 2023, where MOVEit became the target of the Cl0p ransomware group, compromising the data of millions and exposing significant security gaps.


This blog post, prepared with insights from our Principal Security Consultants, provides essential details and guidance to protect your systems from these threats.


Details of the Vulnerabilities

CVE-2024-5805 (MOVEit Gateway):

  • Type: Authentication bypass
  • Affected Version: 2024.0.0
  • Severity Score: 9.1 (Critical)
  • Impact: Allows unauthorized access through an authentication bypass mechanism.
  • Action: Immediate patching is required.

CVE-2024-5806 (MOVEit Transfer):

  • Type: Forced authentication and SFTP user impersonation

Affected Versions:

  • From 2023.0.0 before 2023.0.11
  • From 2023.1.0 before 2023.1.6
  • From 2024.0.0 before 2024.0.2


Severity Score:
9.1 (Critical)

  • Impact: Enables attackers to force authentication and impersonate SFTP users, leading to unauthorized data access, manipulation, and potential full system compromise.
  • Action: Immediate patching is required.


Immediate Action Required

Given the critical nature of these vulnerabilities, immediate action is essential to mitigate potential risks. Users are strongly advised to update their MOVEit software to the latest patched versions provided by Progress Software.

Mitigation Steps

In response to the MOVEit vulnerabilities, users are strongly advised to take immediate action to mitigate associated risks. The Centre for Internet Security (CIS) recommends the following steps:


  • Apply Updates:
  • Promptly install patches provided by Progress Software after conducting necessary tests.
  • Maintain a documented vulnerability management process and update it regularly, especially after significant changes.
  • Use automated tools to manage application updates frequently, preferably monthly or more often.
  • Conduct regular automated scans of externally exposed assets using SCAP-compliant tools to identify vulnerabilities.
  • Address detected vulnerabilities swiftly, using automated tools and processes, on a monthly or more frequent basis.

  • Implement Least Privilege Principle:
  • Ensure that all software runs with the minimum necessary privileges to reduce the potential impact of an attack.
  • Manage and secure default accounts on all enterprise assets and software.
  • Limit administrative privileges to specific accounts designated for administrative tasks, and use non-privileged accounts for everyday activities like browsing and email.

  • Restrict Access:
  • Limit access to file shares, remote systems, and unnecessary services. Use network concentrators, RDP gateways, and similar mechanisms to enforce these restrictions.

  • Deploy Network Intrusion Prevention:
  • Use intrusion detection signatures to block suspicious traffic at network boundaries.
  • Implement a Network Intrusion Detection System (NIDS) or equivalent cloud service to monitor and detect intrusions.
  • Deploy a Network Intrusion Prevention System (NIPS) or equivalent cloud service to prevent potential intrusions.

  • Enhance Exploit Protection:
  • Use tools to detect and block potential exploit conditions.
  • Implement application layer filtering through proxies, application layer firewalls, or gateways to monitor and control application traffic.

For the full advisory and detailed recommendations, please refer to the Centre for Internet Security (CIS) guidelines here.

Explore the entire Evolve suite of products here, designed to give your enterprise complete protection from evolving threats.

Share

A group of people are sitting around a table with a check mark on it.
By Anupama Mukherjee February 20, 2025
Explore the world of cybersecurity preparedness through real-life tabletop exercise scenarios.
A black and white drawing of a group of people standing around a ballot box.
By Threat Intelligence February 13, 2025
In this blog post, we'll explore the legal ramifications of data breaches and provide best practices to help safeguard your business.
A red background with a lock in the middle of it.
By Threat Intelligence February 13, 2025
Master incident response with a foolproof plan. Learn the 4 phases & 5 steps to detect, contain, & recover from cyber threats. Protect your business now!
A man in a hood is standing in front of a computer screen.
By Threat Intelligence February 7, 2025
Actionable threat intelligence is distilled, contextual and real-time data about threats and threat actors that empowers security teams to identify, prioritise and mitigate security risks.

Related Content

Share by: