• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
fortra releases critical patch for cvss 10.0 goanywhere mft vulnerability

Fortra Releases Critical Patch for CVSS 10.0 GoAnywhere MFT Vulnerability

You are here: Home / General Cyber Security News / Fortra Releases Critical Patch for CVSS 10.0 GoAnywhere MFT Vulnerability
September 19, 2025

Fortra has disclosed details of a critical security flaw in GoAnywhere Managed File Transfer (MFT) software that could result in the execution of arbitrary commands.

The vulnerability, tracked as CVE-2025-10035, carries a CVSS score of 10.0, indicating maximum severity.

“A deserialization vulnerability in the License Servlet of Fortra’s GoAnywhere MFT allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection,” Fortra said in an advisory released Thursday.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The company also noted that successful exploitation of the vulnerability is dependent on the system being publicly accessible over the internet.

Users are advised to update to the patched release – version 7.8.4, or the Sustain Release 7.6.3 – to safeguard against potential threats. If immediate patching is not possible, it’s advisable to ensure that access to the GoAnywhere Admin Console is not open to the public.

DFIR Retainer Services

Fortra makes no mention of the flaw being exploited in the wild. That said, previously disclosed shortcomings in the same product (CVE-2023-0669, CVSS score: 7.2) were abused as a zero-day by ransomware actors to steal sensitive data.

Then, early last year, it addressed another critical vulnerability in the GoAnywhere MFT (CVE-2024-0204, CVSS score: 9.8) that could have been exploited to create new administrator users.

“The newly disclosed vulnerability in Fortra’s GoAnywhere MFT solution impacts the same license code path in the Admin Console as the earlier CVE-2023-0669, which was widely exploited by multiple ransomware and APT groups in 2023, including LockBit,” Ryan Dewhurst, head of proactive threat intelligence at watchTowr, said in a statement shared with The Hacker News.

“With thousands of GoAnywhere MFT instances exposed to the Internet, this issue is almost certain to be weaponized for in-the-wild exploitation soon. While Fortra notes exploitation requires external exposure, these systems are generally Internet-facing by design, so organizations should assume they are vulnerable. Organizations should apply the official patches immediately and take steps to restrict external access to the Admin Console.”

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «17,500 phishing domains target 316 brands across 74 countries in 17,500 Phishing Domains Target 316 Brands Across 74 Countries in Global PhaaS Surge
Next Post: SystemBC Powers REM Proxy With 1,500 Daily VPS Victims Across 80 C2 Servers systembc powers rem proxy with 1,500 daily vps victims across»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.