Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Fortra Releases Critical Patch for CVSS 10.0 GoAnywhere MFT Vulnerability

Posted on September 19, 2025September 19, 2025 By CWS

Sep 19, 2025Ravie LakshmananVulnerability / Menace Intelligence
Fortra has disclosed particulars of a important safety flaw in GoAnywhere Managed File Switch (MFT) software program that would outcome within the execution of arbitrary instructions.
The vulnerability, tracked as CVE-2025-10035, carries a CVSS rating of 10.0, indicating most severity.
“A deserialization vulnerability within the License Servlet of Fortra’s GoAnywhere MFT permits an actor with a validly solid license response signature to deserialize an arbitrary actor-controlled object, presumably resulting in command injection,” Fortra stated in an advisory launched Thursday.
The corporate additionally famous that profitable exploitation of the vulnerability relies on the system being publicly accessible over the web.
Customers are suggested to replace to the patched launch – model 7.8.4, or the Maintain Launch 7.6.3 – to safeguard towards potential threats. If instant patching shouldn’t be potential, it is advisable to make sure that entry to the GoAnywhere Admin Console shouldn’t be open to the general public.

Fortra makes no point out of the flaw being exploited within the wild. That stated, beforehand disclosed shortcomings in the identical product (CVE-2023-0669, CVSS rating: 7.2) have been abused as a zero-day by ransomware actors to steal delicate information.
Then, early final 12 months, it addressed one other important vulnerability within the GoAnywhere MFT (CVE-2024-0204, CVSS rating: 9.8) that would have been exploited to create new administrator customers.
“The newly disclosed vulnerability in Fortra’s GoAnywhere MFT resolution impacts the identical license code path within the Admin Console as the sooner CVE-2023-0669, which was broadly exploited by a number of ransomware and APT teams in 2023, together with LockBit,” Ryan Dewhurst, head of proactive risk intelligence at watchTowr, stated in a press release shared with The Hacker Information.
“With 1000’s of GoAnywhere MFT cases uncovered to the Web, this difficulty is sort of sure to be weaponized for in-the-wild exploitation quickly. Whereas Fortra notes exploitation requires exterior publicity, these methods are typically Web-facing by design, so organizations ought to assume they’re weak. Organizations ought to apply the official patches instantly and take steps to limit exterior entry to the Admin Console.”

The Hacker News Tags:Critical, CVSS, Fortra, GoAnywhere, MFT, Patch, Releases, Vulnerability

Post navigation

Previous Post: 17,500 Phishing Domains Target 316 Brands Across 74 Countries in Global PhaaS Surge
Next Post: SystemBC Powers REM Proxy With 1,500 Daily VPS Victims Across 80 C2 Servers

Related Posts

North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers The Hacker News
Key Capabilities Security Leaders Need to Know The Hacker News
APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs The Hacker News
Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices The Hacker News
MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers The Hacker News
How Threat Hunting Builds Readiness The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Transportation Companies Hacked to Steal Cargo
  • Critical React Native CLI Flaw Exposed Millions of Developers to Remote Attacks
  • Hackers Stolen Over $100 million by Exploiting Balancer DeFi protocol
  • Hacker Conversations: Kunal Agarwal and the DNA of a Hacker
  • Bugcrowd Acquires Application Security Firm Mayhem

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Transportation Companies Hacked to Steal Cargo
  • Critical React Native CLI Flaw Exposed Millions of Developers to Remote Attacks
  • Hackers Stolen Over $100 million by Exploiting Balancer DeFi protocol
  • Hacker Conversations: Kunal Agarwal and the DNA of a Hacker
  • Bugcrowd Acquires Application Security Firm Mayhem

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News