Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Fortra Releases Critical Patch for CVSS 10.0 GoAnywhere MFT Vulnerability

Posted on September 19, 2025September 19, 2025 By CWS

Sep 19, 2025Ravie LakshmananVulnerability / Menace Intelligence
Fortra has disclosed particulars of a important safety flaw in GoAnywhere Managed File Switch (MFT) software program that would outcome within the execution of arbitrary instructions.
The vulnerability, tracked as CVE-2025-10035, carries a CVSS rating of 10.0, indicating most severity.
“A deserialization vulnerability within the License Servlet of Fortra’s GoAnywhere MFT permits an actor with a validly solid license response signature to deserialize an arbitrary actor-controlled object, presumably resulting in command injection,” Fortra stated in an advisory launched Thursday.
The corporate additionally famous that profitable exploitation of the vulnerability relies on the system being publicly accessible over the web.
Customers are suggested to replace to the patched launch – model 7.8.4, or the Maintain Launch 7.6.3 – to safeguard towards potential threats. If instant patching shouldn’t be potential, it is advisable to make sure that entry to the GoAnywhere Admin Console shouldn’t be open to the general public.

Fortra makes no point out of the flaw being exploited within the wild. That stated, beforehand disclosed shortcomings in the identical product (CVE-2023-0669, CVSS rating: 7.2) have been abused as a zero-day by ransomware actors to steal delicate information.
Then, early final 12 months, it addressed one other important vulnerability within the GoAnywhere MFT (CVE-2024-0204, CVSS rating: 9.8) that would have been exploited to create new administrator customers.
“The newly disclosed vulnerability in Fortra’s GoAnywhere MFT resolution impacts the identical license code path within the Admin Console as the sooner CVE-2023-0669, which was broadly exploited by a number of ransomware and APT teams in 2023, together with LockBit,” Ryan Dewhurst, head of proactive risk intelligence at watchTowr, stated in a press release shared with The Hacker Information.
“With 1000’s of GoAnywhere MFT cases uncovered to the Web, this difficulty is sort of sure to be weaponized for in-the-wild exploitation quickly. Whereas Fortra notes exploitation requires exterior publicity, these methods are typically Web-facing by design, so organizations ought to assume they’re weak. Organizations ought to apply the official patches instantly and take steps to limit exterior entry to the Admin Console.”

The Hacker News Tags:Critical, CVSS, Fortra, GoAnywhere, MFT, Patch, Releases, Vulnerability

Post navigation

Previous Post: 17,500 Phishing Domains Target 316 Brands Across 74 Countries in Global PhaaS Surge
Next Post: SystemBC Powers REM Proxy With 1,500 Daily VPS Victims Across 80 C2 Servers

Related Posts

Ex-CIA Analyst Sentenced to 37 Months for Leaking Top Secret National Defense Documents The Hacker News
Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats The Hacker News
SAP Patches Critical NetWeaver (CVSS Up to 10.0) and Previously Exploited S/4HANA Flaws The Hacker News
Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data The Hacker News
New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers The Hacker News
How to Protect Your Backups The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Breachlock Named Sample Vendor for PTaaS and AEV in Two 2025 Gartner Reports
  • Phishing Attacks Using AI-Powered Platforms to Misleads Users and Evades Security Tools
  • UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware
  • Top 10 Best API Security Testing Tools in 2025
  • Nokia CBIS/NCS Manager API Vulnerability Let Attackers Bypass Authentication

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Breachlock Named Sample Vendor for PTaaS and AEV in Two 2025 Gartner Reports
  • Phishing Attacks Using AI-Powered Platforms to Misleads Users and Evades Security Tools
  • UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware
  • Top 10 Best API Security Testing Tools in 2025
  • Nokia CBIS/NCS Manager API Vulnerability Let Attackers Bypass Authentication

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News