Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fortra Releases Critical Patch for CVSS 10.0 GoAnywhere MFT Vulnerability

Fortra Releases Critical Patch for CVSS 10.0 GoAnywhere MFT Vulnerability

Posted on September 19, 2025September 19, 2025 By CWS

Sep 19, 2025Ravie LakshmananVulnerability / Menace Intelligence
Fortra has disclosed particulars of a important safety flaw in GoAnywhere Managed File Switch (MFT) software program that would outcome within the execution of arbitrary instructions.
The vulnerability, tracked as CVE-2025-10035, carries a CVSS rating of 10.0, indicating most severity.
“A deserialization vulnerability within the License Servlet of Fortra’s GoAnywhere MFT permits an actor with a validly solid license response signature to deserialize an arbitrary actor-controlled object, presumably resulting in command injection,” Fortra stated in an advisory launched Thursday.
The corporate additionally famous that profitable exploitation of the vulnerability relies on the system being publicly accessible over the web.
Customers are suggested to replace to the patched launch – model 7.8.4, or the Maintain Launch 7.6.3 – to safeguard towards potential threats. If instant patching shouldn’t be potential, it is advisable to make sure that entry to the GoAnywhere Admin Console shouldn’t be open to the general public.

Fortra makes no point out of the flaw being exploited within the wild. That stated, beforehand disclosed shortcomings in the identical product (CVE-2023-0669, CVSS rating: 7.2) have been abused as a zero-day by ransomware actors to steal delicate information.
Then, early final 12 months, it addressed one other important vulnerability within the GoAnywhere MFT (CVE-2024-0204, CVSS rating: 9.8) that would have been exploited to create new administrator customers.
“The newly disclosed vulnerability in Fortra’s GoAnywhere MFT resolution impacts the identical license code path within the Admin Console as the sooner CVE-2023-0669, which was broadly exploited by a number of ransomware and APT teams in 2023, together with LockBit,” Ryan Dewhurst, head of proactive risk intelligence at watchTowr, stated in a press release shared with The Hacker Information.
“With 1000’s of GoAnywhere MFT cases uncovered to the Web, this difficulty is sort of sure to be weaponized for in-the-wild exploitation quickly. Whereas Fortra notes exploitation requires exterior publicity, these methods are typically Web-facing by design, so organizations ought to assume they’re weak. Organizations ought to apply the official patches instantly and take steps to limit exterior entry to the Admin Console.”

The Hacker News Tags:Critical, CVSS, Fortra, GoAnywhere, MFT, Patch, Releases, Vulnerability

Post navigation

Previous Post: 17,500 Phishing Domains Target 316 Brands Across 74 Countries in Global PhaaS Surge
Next Post: SystemBC Powers REM Proxy With 1,500 Daily VPS Victims Across 80 C2 Servers

Related Posts

GlassWorm Attack Exploits Open VSX Extensions to Target Developers GlassWorm Attack Exploits Open VSX Extensions to Target Developers The Hacker News
Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists The Hacker News
Trojan VPNs Spread via SEO Poisoning, Microsoft Warns Trojan VPNs Spread via SEO Poisoning, Microsoft Warns The Hacker News
3 Ways to Protect Your Business in 2026 3 Ways to Protect Your Business in 2026 The Hacker News
Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users The Hacker News
New n8n Vulnerability (9.9 CVSS) Lets Authenticated Users Execute System Commands New n8n Vulnerability (9.9 CVSS) Lets Authenticated Users Execute System Commands The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark