Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Fortra Releases Critical Patch for CVSS 10.0 GoAnywhere MFT Vulnerability

Posted on September 19, 2025September 19, 2025 By CWS

Sep 19, 2025Ravie LakshmananVulnerability / Menace Intelligence
Fortra has disclosed particulars of a important safety flaw in GoAnywhere Managed File Switch (MFT) software program that would outcome within the execution of arbitrary instructions.
The vulnerability, tracked as CVE-2025-10035, carries a CVSS rating of 10.0, indicating most severity.
“A deserialization vulnerability within the License Servlet of Fortra’s GoAnywhere MFT permits an actor with a validly solid license response signature to deserialize an arbitrary actor-controlled object, presumably resulting in command injection,” Fortra stated in an advisory launched Thursday.
The corporate additionally famous that profitable exploitation of the vulnerability relies on the system being publicly accessible over the web.
Customers are suggested to replace to the patched launch – model 7.8.4, or the Maintain Launch 7.6.3 – to safeguard towards potential threats. If instant patching shouldn’t be potential, it is advisable to make sure that entry to the GoAnywhere Admin Console shouldn’t be open to the general public.

Fortra makes no point out of the flaw being exploited within the wild. That stated, beforehand disclosed shortcomings in the identical product (CVE-2023-0669, CVSS rating: 7.2) have been abused as a zero-day by ransomware actors to steal delicate information.
Then, early final 12 months, it addressed one other important vulnerability within the GoAnywhere MFT (CVE-2024-0204, CVSS rating: 9.8) that would have been exploited to create new administrator customers.
“The newly disclosed vulnerability in Fortra’s GoAnywhere MFT resolution impacts the identical license code path within the Admin Console as the sooner CVE-2023-0669, which was broadly exploited by a number of ransomware and APT teams in 2023, together with LockBit,” Ryan Dewhurst, head of proactive risk intelligence at watchTowr, stated in a press release shared with The Hacker Information.
“With 1000’s of GoAnywhere MFT cases uncovered to the Web, this difficulty is sort of sure to be weaponized for in-the-wild exploitation quickly. Whereas Fortra notes exploitation requires exterior publicity, these methods are typically Web-facing by design, so organizations ought to assume they’re weak. Organizations ought to apply the official patches instantly and take steps to limit exterior entry to the Admin Console.”

The Hacker News Tags:Critical, CVSS, Fortra, GoAnywhere, MFT, Patch, Releases, Vulnerability

Post navigation

Previous Post: 17,500 Phishing Domains Target 316 Brands Across 74 Countries in Global PhaaS Surge
Next Post: SystemBC Powers REM Proxy With 1,500 Daily VPS Victims Across 80 C2 Servers

Related Posts

100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads The Hacker News
Turning BIA Insights Into Resilient Recovery The Hacker News
New HTTP/2 ‘MadeYouReset’ Vulnerability Enables Large-Scale DoS Attacks The Hacker News
Deepfakes. Fake Recruiters. Cloned CFOs — Learn How to Stop AI-Driven Attacks in Real Time The Hacker News
How to Stop Python Supply Chain Attacks—and the Expert Tools You Need The Hacker News
LangSmith Bug Could Expose OpenAI Keys and User Data via Malicious Agents The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Apple Patches 19 WebKit Vulnerabilities 
  • Zscaler Acquires AI Security Company SPLX
  • Hackers Actively Scanning Internet to Exploit XWiki Remote Code Execution Vulnerability
  • Android Update Patches Critical Remote Code Execution Flaw
  • Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKit

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Apple Patches 19 WebKit Vulnerabilities 
  • Zscaler Acquires AI Security Company SPLX
  • Hackers Actively Scanning Internet to Exploit XWiki Remote Code Execution Vulnerability
  • Android Update Patches Critical Remote Code Execution Flaw
  • Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKit

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News