Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Progress Patches MOVEit Transfer Uncontrolled Resource Consumption vulnerability

Posted on October 31, 2025October 31, 2025 By CWS

Progress Software program has launched vital safety patches addressing a high-severity vulnerability affecting MOVEit Switch, a extensively used enterprise file switch answer.

The vulnerability, tracked as CVE-2025-10932, carries a CVSS rating of 8.2 and impacts the AS2 module throughout a number of product variations.

The uncontrolled useful resource consumption vulnerability in MOVEit Switch’s AS2 module may enable attackers to disrupt service availability by exhausting system assets.

The flaw exists in variations 2025.0.0 by 2025.0.2, 2024.1.0 by 2024.1.6, and 2023.1.0 by 2023.1.15. With a network-accessible assault vector requiring no authentication or consumer interplay, organizations utilizing affected variations face important publicity to potential service disruptions and exploitation.

MOVEit Switch Vulnerability

The vulnerability stems from insufficient controls over useful resource consumption, labeled beneath CWE-400. This class of flaws allows attackers to overwhelm methods by forcing extreme useful resource allocation, resulting in denial-of-service circumstances that influence professional enterprise operations.

Progress has distributed hotfixes that mandate IP deal with whitelisting for the AS2 module, making a protecting barrier in opposition to unauthorized entry. Organizations should take fast motion based mostly on their particular deployment mannequin.

For enterprises not using the AS2 module with MOVEit merchandise, a brief workaround entails eradicating the susceptible endpoints.

Directors ought to delete the AS2Rec2.ashx and AS2Receiver.aspx information from the C:MOVEitTransferwwwroot listing. This easy method requires no server restart and maintains continuity till everlasting patches are utilized.

For organizations actively utilizing AS2 performance, making use of the hotfix turns into important. After updating to the patched variations MOVEit Switch 2025.0.3, 2024.1.7, or 2023.1.16, directors should configure IP whitelist guidelines for licensed buying and selling companions.

AttributeValueCVE IDCVE-2025-10932ProductProgress MOVEit TransferVulnerability TypeUncontrolled Useful resource ConsumptionAffected ModuleAS2 ModuleCVSS Score8.2 (HIGH)

This entails logging into MOVEit Switch as an administrator, navigating to Settings, accessing Safety Insurance policies, and configuring Distant Entry Guidelines to limit AS2 module entry to trusted accomplice IP addresses.

Progress has made mounted variations out there by its Obtain Middle for patrons sustaining present upkeep agreements. The patch availability spans three main model traces, making certain organizations can replace inside their supported product department.

Prospects with out energetic upkeep agreements ought to contact Progress renewal companies or their designated accomplice account consultant.

Notably, Progress MOVEit Cloud customers require no fast motion, because the cloud infrastructure has already been upgraded to patched variations. Nonetheless, on-premises deployments demand fast consideration to mitigate publicity.

Organizations operating MOVEit Switch variations outdoors these energetic branches ought to prioritize upgrading to at the moment supported releases or implementing the non permanent AS2 endpoint elimination workaround.

The excessive CVSS rating displays the severity of this vulnerability and the potential enterprise influence of service disruptions. Fast deployment of patches represents a vital precedence for safety groups managing file switch infrastructure throughout their enterprise environments.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Consumption, MOVEit, Patches, Progress, Resource, Transfer, Uncontrolled, Vulnerability

Post navigation

Previous Post: Open VSX Downplays Impact From GlassWorm Campaign
Next Post: Ukrainian Man Extradited From Ireland to US Over Conti Ransomware Charges

Related Posts

New GhostSocks Malware-as-a-Service Enables Threat Actors to Convert Compromised Devices into Proxies Cyber Security News
New SmartAttack Steals Sensitive Data From Air-Gapped Systems via Smartwatches Cyber Security News
New XWorm V6 Variant Injects Malicious Code into a Legitimate Windows Program Cyber Security News
Graphite Spyware Exploits Apple iOS Zero-Click Vulnerability to Attack Journalists Cyber Security News
New SEO Poisoning Attacking Windows Users With Weaponized Software Sites Cyber Security News
Linux 6.17 Released With Fix for use-after-free Vulnerabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach
  • CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware
  • Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell
  • Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations
  • Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach
  • CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware
  • Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell
  • Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations
  • Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News