Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Major MOVEit Security Flaw Prompts Urgent Software Update

Major MOVEit Security Flaw Prompts Urgent Software Update

Posted on May 4, 2026 By CWS

Progress Software has released an urgent security alert for its MOVEit Automation platform, highlighting critical vulnerabilities that demand immediate attention from users. The alert, issued in April 2026, identifies two severe security holes that could enable attackers to bypass authentication and gain full control over the system.

Understanding the MOVEit Vulnerabilities

The MOVEit Automation platform is a widely utilized tool for secure file transfers among enterprises, making it an attractive target for cyber threats. The newly discovered flaws could potentially compromise the security of sensitive data if left unpatched. Organizations using this software are strongly advised to implement the latest updates without delay to mitigate unauthorized access and potential data breaches.

Details of the Authentication Bypass Flaw

The alert centers on two vulnerabilities uncovered by Airbus SecLab researchers Anaïs Gantet, Delphine Gourdou, Quentin Liddell, and Matteo Ricordeau. These flaws can be exploited through the service backend command port interfaces, allowing threat actors to bypass login mechanisms, access sensitive files, and assume administrative control of the server.

Security personnel should scrutinize audit logs for any unexpected changes in privileges or unusual backend activity. The specific vulnerabilities are:

  • CVE-2026-4670: This flaw facilitates an authentication bypass, enabling unauthorized external users to access the system without valid credentials.
  • CVE-2026-5174: This issue involves improper input validation, leading to privilege escalation that allows attackers to elevate standard access to administrative levels.

Recommended Actions and Updates

These vulnerabilities affect multiple versions of the MOVEit Automation software. Progress Software strongly advises administrators to review their current installations by accessing the Web Admin dashboard and checking the “About” section under the “Help” menu.

The affected software builds include:

  • MOVEit Automation 2025.1.4 and earlier versions
  • MOVEit Automation 2025.0.8 and earlier versions
  • MOVEit Automation 2024.1.7 and prior versions

To address these issues, Progress Software has released new secure versions. Administrators are urged to upgrade using the official updates provided:

  • Upgrade to MOVEit Automation 2025.1.5 for the 2025.1 track
  • Upgrade to MOVEit Automation 2025.0.9 for the 2025.0 track
  • Upgrade to MOVEit Automation 2024.1.8 for the 2024.1 track

These updates can be downloaded by customers with an active maintenance agreement via the Progress Community portal. It’s crucial for organizations using unsupported software versions to transition to supported releases to maintain the security of their file transfer systems against these critical vulnerabilities.

Stay informed with our daily cybersecurity updates by following us on Google News, LinkedIn, and X. Contact us to share your stories.

Cyber Security News Tags:authentication bypass, Cybersecurity, data protection, enterprise software, IT security, MOVEit, Progress Software, security alert, software update, Vulnerability

Post navigation

Previous Post: OpenAI Unveils Enhanced ChatGPT Security Feature
Next Post: Critical cPanel Flaw Exploited Against Government Networks

Related Posts

How ClickFix and Multi-Stage Frameworks Are Breaking Enterprise Defenses How ClickFix and Multi-Stage Frameworks Are Breaking Enterprise Defenses Cyber Security News
Apache Tomcat Security Flaw Allows Constraint Bypass Apache Tomcat Security Flaw Allows Constraint Bypass Cyber Security News
Kali Linux 2025.3 Released With New Features and 10 New Hacking Tools Kali Linux 2025.3 Released With New Features and 10 New Hacking Tools Cyber Security News
Adobe Photoshop Vulnerability Let Attackers Execute Arbitrary Code Adobe Photoshop Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News
Hackers Allegedly Claim Breach Of HSBC USA Customers’ Records Including Financial Details Hackers Allegedly Claim Breach Of HSBC USA Customers’ Records Including Financial Details Cyber Security News
New EDRStartupHinder Tool blocks antivirus and EDR services at startup on Windows 11 25H2 Defender New EDRStartupHinder Tool blocks antivirus and EDR services at startup on Windows 11 25H2 Defender Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • DigiCert Enhances Security After Support Portal Hack
  • AI-Driven Cyber Attacks Surge in 2025
  • Rising Phishing Threats Exploit Microsoft Teams and Email
  • Critical Flaw in FreeBSD DHCP Client Enables Remote Exploits
  • Linux ‘Copy Fail’ Vulnerability Exploited by Hackers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • DigiCert Enhances Security After Support Portal Hack
  • AI-Driven Cyber Attacks Surge in 2025
  • Rising Phishing Threats Exploit Microsoft Teams and Email
  • Critical Flaw in FreeBSD DHCP Client Enables Remote Exploits
  • Linux ‘Copy Fail’ Vulnerability Exploited by Hackers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark