Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Progress Patches MOVEit Transfer Uncontrolled Resource Consumption vulnerability

Posted on October 31, 2025October 31, 2025 By CWS

Progress Software program has launched vital safety patches addressing a high-severity vulnerability affecting MOVEit Switch, a extensively used enterprise file switch answer.

The vulnerability, tracked as CVE-2025-10932, carries a CVSS rating of 8.2 and impacts the AS2 module throughout a number of product variations.

The uncontrolled useful resource consumption vulnerability in MOVEit Switch’s AS2 module may enable attackers to disrupt service availability by exhausting system assets.

The flaw exists in variations 2025.0.0 by 2025.0.2, 2024.1.0 by 2024.1.6, and 2023.1.0 by 2023.1.15. With a network-accessible assault vector requiring no authentication or consumer interplay, organizations utilizing affected variations face important publicity to potential service disruptions and exploitation.

MOVEit Switch Vulnerability

The vulnerability stems from insufficient controls over useful resource consumption, labeled beneath CWE-400. This class of flaws allows attackers to overwhelm methods by forcing extreme useful resource allocation, resulting in denial-of-service circumstances that influence professional enterprise operations.

Progress has distributed hotfixes that mandate IP deal with whitelisting for the AS2 module, making a protecting barrier in opposition to unauthorized entry. Organizations should take fast motion based mostly on their particular deployment mannequin.

For enterprises not using the AS2 module with MOVEit merchandise, a brief workaround entails eradicating the susceptible endpoints.

Directors ought to delete the AS2Rec2.ashx and AS2Receiver.aspx information from the C:MOVEitTransferwwwroot listing. This easy method requires no server restart and maintains continuity till everlasting patches are utilized.

For organizations actively utilizing AS2 performance, making use of the hotfix turns into important. After updating to the patched variations MOVEit Switch 2025.0.3, 2024.1.7, or 2023.1.16, directors should configure IP whitelist guidelines for licensed buying and selling companions.

AttributeValueCVE IDCVE-2025-10932ProductProgress MOVEit TransferVulnerability TypeUncontrolled Useful resource ConsumptionAffected ModuleAS2 ModuleCVSS Score8.2 (HIGH)

This entails logging into MOVEit Switch as an administrator, navigating to Settings, accessing Safety Insurance policies, and configuring Distant Entry Guidelines to limit AS2 module entry to trusted accomplice IP addresses.

Progress has made mounted variations out there by its Obtain Middle for patrons sustaining present upkeep agreements. The patch availability spans three main model traces, making certain organizations can replace inside their supported product department.

Prospects with out energetic upkeep agreements ought to contact Progress renewal companies or their designated accomplice account consultant.

Notably, Progress MOVEit Cloud customers require no fast motion, because the cloud infrastructure has already been upgraded to patched variations. Nonetheless, on-premises deployments demand fast consideration to mitigate publicity.

Organizations operating MOVEit Switch variations outdoors these energetic branches ought to prioritize upgrading to at the moment supported releases or implementing the non permanent AS2 endpoint elimination workaround.

The excessive CVSS rating displays the severity of this vulnerability and the potential enterprise influence of service disruptions. Fast deployment of patches represents a vital precedence for safety groups managing file switch infrastructure throughout their enterprise environments.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Consumption, MOVEit, Patches, Progress, Resource, Transfer, Uncontrolled, Vulnerability

Post navigation

Previous Post: Open VSX Downplays Impact From GlassWorm Campaign
Next Post: Ukrainian Man Extradited From Ireland to US Over Conti Ransomware Charges

Related Posts

New Malware Attack Leverages YouTube Channels and Discord to Harvest Credentials from Computer Cyber Security News
Windows Remote Access Connection Manager 0-Day Vulnerability Exploited in Attacks Cyber Security News
Google Unveils new AI-Protection for Android to Keep You Safe From Mobile Scams Cyber Security News
Lazarus Hackers Trick Users Into Believing Their Camera or Microphone is Blocked to Deliver PyLangGhost RAT Cyber Security News
PoC Exploit for 7-Zip Vulnerabilities that Allows Remote Code Execution Cyber Security News
YouTube Down for Users Globally – Google Confirms Outage Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks
  • Beware of Malicious ChatGPT Apps That Records Users Action and Steals Sensitive Data
  • GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks
  • Beware of Malicious ChatGPT Apps That Records Users Action and Steals Sensitive Data
  • GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News