Security Alert: Critical MOVEit Vulnerabilities Exposed

Threat Intelligence • June 28, 2024

Background

Recently, significant vulnerabilities have been discovered in the MOVEit Transfer and MOVEit Gateway products, posing serious risks to data security. These vulnerabilities, tracked as CVE-2024-5805 and CVE-2024-5806, could potentially allow unauthorized access and data breaches. 


This discovery follows the major breach in May 2023, where MOVEit became the target of the Cl0p ransomware group, compromising the data of millions and exposing significant security gaps.


This blog post, prepared with insights from our Principal Security Consultants, provides essential details and guidance to protect your systems from these threats.


Details of the Vulnerabilities

CVE-2024-5805 (MOVEit Gateway):

  • Type: Authentication bypass
  • Affected Version: 2024.0.0
  • Severity Score: 9.1 (Critical)
  • Impact: Allows unauthorized access through an authentication bypass mechanism.
  • Action: Immediate patching is required.

CVE-2024-5806 (MOVEit Transfer):

  • Type: Forced authentication and SFTP user impersonation

Affected Versions:

  • From 2023.0.0 before 2023.0.11
  • From 2023.1.0 before 2023.1.6
  • From 2024.0.0 before 2024.0.2


Severity Score:
9.1 (Critical)

  • Impact: Enables attackers to force authentication and impersonate SFTP users, leading to unauthorized data access, manipulation, and potential full system compromise.
  • Action: Immediate patching is required.


Immediate Action Required

Given the critical nature of these vulnerabilities, immediate action is essential to mitigate potential risks. Users are strongly advised to update their MOVEit software to the latest patched versions provided by Progress Software.

Mitigation Steps

In response to the MOVEit vulnerabilities, users are strongly advised to take immediate action to mitigate associated risks. The Centre for Internet Security (CIS) recommends the following steps:


  • Apply Updates:
  • Promptly install patches provided by Progress Software after conducting necessary tests.
  • Maintain a documented vulnerability management process and update it regularly, especially after significant changes.
  • Use automated tools to manage application updates frequently, preferably monthly or more often.
  • Conduct regular automated scans of externally exposed assets using SCAP-compliant tools to identify vulnerabilities.
  • Address detected vulnerabilities swiftly, using automated tools and processes, on a monthly or more frequent basis.

  • Implement Least Privilege Principle:
  • Ensure that all software runs with the minimum necessary privileges to reduce the potential impact of an attack.
  • Manage and secure default accounts on all enterprise assets and software.
  • Limit administrative privileges to specific accounts designated for administrative tasks, and use non-privileged accounts for everyday activities like browsing and email.

  • Restrict Access:
  • Limit access to file shares, remote systems, and unnecessary services. Use network concentrators, RDP gateways, and similar mechanisms to enforce these restrictions.

  • Deploy Network Intrusion Prevention:
  • Use intrusion detection signatures to block suspicious traffic at network boundaries.
  • Implement a Network Intrusion Detection System (NIDS) or equivalent cloud service to monitor and detect intrusions.
  • Deploy a Network Intrusion Prevention System (NIPS) or equivalent cloud service to prevent potential intrusions.

  • Enhance Exploit Protection:
  • Use tools to detect and block potential exploit conditions.
  • Implement application layer filtering through proxies, application layer firewalls, or gateways to monitor and control application traffic.

For the full advisory and detailed recommendations, please refer to the Centre for Internet Security (CIS) guidelines here.

Explore the entire Evolve suite of products here, designed to give your enterprise complete protection from evolving threats.

Share

A blue background with a lot of numbers on it
By Threat Intelligence March 26, 2025
Enhance your incident response readiness with XDR. Streamline threat detection, investigation, and containment for faster, smarter security operations.
A man is sitting in front of a laptop computer.
By Threat Intelligence March 13, 2025
Learn about the prevalent threats targeting enterprises today and the advanced solutions designed to combat them effectively in this blog post.
An illustration of a laptop with a shield and a bottle coming out of it.
By Threat Intelligence March 6, 2025
Boost your cybersecurity with EDR. Detect and stop advanced threats, enhance visibility, and streamline response. Explore best practices and top tools now.
Two men are running away from a laptop with a clock coming out of it.
By Threat Intelligence February 27, 2025
In this article, we will delve into the concept of critical incident response time and its crucial role in safeguarding your organization's cybersecurity.

Related Content

We use cookies to ensure that we give you the best experience on our website. To learn more, go to the Privacy Page.
×
Share by: