Threat Intelligence logo

Security Alert: Critical MOVEit Vulnerabilities Exposed

Threat Intelligence • June 28, 2024

Background

Recently, significant vulnerabilities have been discovered in the MOVEit Transfer and MOVEit Gateway products, posing serious risks to data security. These vulnerabilities, tracked as CVE-2024-5805 and CVE-2024-5806, could potentially allow unauthorized access and data breaches. 


This discovery follows the major breach in May 2023, where MOVEit became the target of the Cl0p ransomware group, compromising the data of millions and exposing significant security gaps.


This blog post, prepared with insights from our Principal Security Consultants, provides essential details and guidance to protect your systems from these threats.


Details of the Vulnerabilities

CVE-2024-5805 (MOVEit Gateway):

  • Type: Authentication bypass
  • Affected Version: 2024.0.0
  • Severity Score: 9.1 (Critical)
  • Impact: Allows unauthorized access through an authentication bypass mechanism.
  • Action: Immediate patching is required.

CVE-2024-5806 (MOVEit Transfer):

  • Type: Forced authentication and SFTP user impersonation

Affected Versions:

  • From 2023.0.0 before 2023.0.11
  • From 2023.1.0 before 2023.1.6
  • From 2024.0.0 before 2024.0.2


Severity Score:
9.1 (Critical)

  • Impact: Enables attackers to force authentication and impersonate SFTP users, leading to unauthorized data access, manipulation, and potential full system compromise.
  • Action: Immediate patching is required.


Immediate Action Required

Given the critical nature of these vulnerabilities, immediate action is essential to mitigate potential risks. Users are strongly advised to update their MOVEit software to the latest patched versions provided by Progress Software.

Mitigation Steps

In response to the MOVEit vulnerabilities, users are strongly advised to take immediate action to mitigate associated risks. The Centre for Internet Security (CIS) recommends the following steps:


  • Apply Updates:
  • Promptly install patches provided by Progress Software after conducting necessary tests.
  • Maintain a documented vulnerability management process and update it regularly, especially after significant changes.
  • Use automated tools to manage application updates frequently, preferably monthly or more often.
  • Conduct regular automated scans of externally exposed assets using SCAP-compliant tools to identify vulnerabilities.
  • Address detected vulnerabilities swiftly, using automated tools and processes, on a monthly or more frequent basis.

  • Implement Least Privilege Principle:
  • Ensure that all software runs with the minimum necessary privileges to reduce the potential impact of an attack.
  • Manage and secure default accounts on all enterprise assets and software.
  • Limit administrative privileges to specific accounts designated for administrative tasks, and use non-privileged accounts for everyday activities like browsing and email.

  • Restrict Access:
  • Limit access to file shares, remote systems, and unnecessary services. Use network concentrators, RDP gateways, and similar mechanisms to enforce these restrictions.

  • Deploy Network Intrusion Prevention:
  • Use intrusion detection signatures to block suspicious traffic at network boundaries.
  • Implement a Network Intrusion Detection System (NIDS) or equivalent cloud service to monitor and detect intrusions.
  • Deploy a Network Intrusion Prevention System (NIPS) or equivalent cloud service to prevent potential intrusions.

  • Enhance Exploit Protection:
  • Use tools to detect and block potential exploit conditions.
  • Implement application layer filtering through proxies, application layer firewalls, or gateways to monitor and control application traffic.

For the full advisory and detailed recommendations, please refer to the Centre for Internet Security (CIS) guidelines here.

Explore the entire Evolve suite of products here, designed to give your enterprise complete protection from evolving threats.

Share

A red cube is glowing in the dark on a black background.
By Threat Intelligence November 14, 2024
Explore the importance of critical infrastructure protection and how cyber threats like ransomware, data breaches, and denial-of-service attacks jeopardize essential services.
A white wifi icon in a circle on a black and red background.
By Threat Intelligence November 7, 2024
In this blog post, we will explore the ins and outs of wireless penetration testing – what it is, the steps involved, the tools used, and the invaluable benefits it brings to the table.
Man sitting on a couch with his laptop
By Threat Intelligence October 30, 2024
Discover the most common security oversights we see in enterprise environments—from outdated practices to overlooked vulnerabilities—and learn how to strengthen your security posture to face today’s evolving threats.
A laptop computer with a lot of numbers on the screen.
By Anupama Mukherjee October 17, 2024
Learn how to effectively secure your OT and SCADA systems with this in-depth guide to penetration testing, covering key steps, best practices, and essential insights for protecting critical infrastructure.

Related Content

Share by: