Threat Intelligence logo

Security Alert: Critical MOVEit Vulnerabilities Exposed

Threat Intelligence • June 28, 2024

Background

Recently, significant vulnerabilities have been discovered in the MOVEit Transfer and MOVEit Gateway products, posing serious risks to data security. These vulnerabilities, tracked as CVE-2024-5805 and CVE-2024-5806, could potentially allow unauthorized access and data breaches. 


This discovery follows the major breach in May 2023, where MOVEit became the target of the Cl0p ransomware group, compromising the data of millions and exposing significant security gaps.


This blog post, prepared with insights from our Principal Security Consultants, provides essential details and guidance to protect your systems from these threats.


Details of the Vulnerabilities

CVE-2024-5805 (MOVEit Gateway):

  • Type: Authentication bypass
  • Affected Version: 2024.0.0
  • Severity Score: 9.1 (Critical)
  • Impact: Allows unauthorized access through an authentication bypass mechanism.
  • Action: Immediate patching is required.

CVE-2024-5806 (MOVEit Transfer):

  • Type: Forced authentication and SFTP user impersonation

Affected Versions:

  • From 2023.0.0 before 2023.0.11
  • From 2023.1.0 before 2023.1.6
  • From 2024.0.0 before 2024.0.2


Severity Score:
9.1 (Critical)

  • Impact: Enables attackers to force authentication and impersonate SFTP users, leading to unauthorized data access, manipulation, and potential full system compromise.
  • Action: Immediate patching is required.


Immediate Action Required

Given the critical nature of these vulnerabilities, immediate action is essential to mitigate potential risks. Users are strongly advised to update their MOVEit software to the latest patched versions provided by Progress Software.

Mitigation Steps

In response to the MOVEit vulnerabilities, users are strongly advised to take immediate action to mitigate associated risks. The Centre for Internet Security (CIS) recommends the following steps:


  • Apply Updates:
  • Promptly install patches provided by Progress Software after conducting necessary tests.
  • Maintain a documented vulnerability management process and update it regularly, especially after significant changes.
  • Use automated tools to manage application updates frequently, preferably monthly or more often.
  • Conduct regular automated scans of externally exposed assets using SCAP-compliant tools to identify vulnerabilities.
  • Address detected vulnerabilities swiftly, using automated tools and processes, on a monthly or more frequent basis.

  • Implement Least Privilege Principle:
  • Ensure that all software runs with the minimum necessary privileges to reduce the potential impact of an attack.
  • Manage and secure default accounts on all enterprise assets and software.
  • Limit administrative privileges to specific accounts designated for administrative tasks, and use non-privileged accounts for everyday activities like browsing and email.

  • Restrict Access:
  • Limit access to file shares, remote systems, and unnecessary services. Use network concentrators, RDP gateways, and similar mechanisms to enforce these restrictions.

  • Deploy Network Intrusion Prevention:
  • Use intrusion detection signatures to block suspicious traffic at network boundaries.
  • Implement a Network Intrusion Detection System (NIDS) or equivalent cloud service to monitor and detect intrusions.
  • Deploy a Network Intrusion Prevention System (NIPS) or equivalent cloud service to prevent potential intrusions.

  • Enhance Exploit Protection:
  • Use tools to detect and block potential exploit conditions.
  • Implement application layer filtering through proxies, application layer firewalls, or gateways to monitor and control application traffic.

For the full advisory and detailed recommendations, please refer to the Centre for Internet Security (CIS) guidelines here.

Explore the entire Evolve suite of products here, designed to give your enterprise complete protection from evolving threats.

Share

Two computer monitors are sitting on a desk next to each other.
By Threat Intelligence January 16, 2025
SIEM software uses advanced detection, analytics, and response capabilities to provide insights into everything going on within an IT environment.
A person with a mask on their face is sitting in front of a computer.
By Threat Intelligence January 9, 2025
In this blog post, we're going to dive into threat hunting and how it can help your organization.
The words siem vs soar are written in red on a black background
By Threat Intelligence January 3, 2025
Compare SIEM and SOAR to discover their unique strengths and how they complement each other. Learn why your business might need both for robust security. Read more!
A robotic hand is pointing at something in front of a clock
By Threat Intelligence December 22, 2024
Learn how AI-powered XDR enhances threat detection, response, and analyst efficiency for better cyber defense.

Related Content

Share by: