Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Major MOVEit Security Flaw Prompts Urgent Software Update

Major MOVEit Security Flaw Prompts Urgent Software Update

Posted on May 4, 2026 By CWS

Progress Software has released an urgent security alert for its MOVEit Automation platform, highlighting critical vulnerabilities that demand immediate attention from users. The alert, issued in April 2026, identifies two severe security holes that could enable attackers to bypass authentication and gain full control over the system.

Understanding the MOVEit Vulnerabilities

The MOVEit Automation platform is a widely utilized tool for secure file transfers among enterprises, making it an attractive target for cyber threats. The newly discovered flaws could potentially compromise the security of sensitive data if left unpatched. Organizations using this software are strongly advised to implement the latest updates without delay to mitigate unauthorized access and potential data breaches.

Details of the Authentication Bypass Flaw

The alert centers on two vulnerabilities uncovered by Airbus SecLab researchers Anaïs Gantet, Delphine Gourdou, Quentin Liddell, and Matteo Ricordeau. These flaws can be exploited through the service backend command port interfaces, allowing threat actors to bypass login mechanisms, access sensitive files, and assume administrative control of the server.

Security personnel should scrutinize audit logs for any unexpected changes in privileges or unusual backend activity. The specific vulnerabilities are:

  • CVE-2026-4670: This flaw facilitates an authentication bypass, enabling unauthorized external users to access the system without valid credentials.
  • CVE-2026-5174: This issue involves improper input validation, leading to privilege escalation that allows attackers to elevate standard access to administrative levels.

Recommended Actions and Updates

These vulnerabilities affect multiple versions of the MOVEit Automation software. Progress Software strongly advises administrators to review their current installations by accessing the Web Admin dashboard and checking the “About” section under the “Help” menu.

The affected software builds include:

  • MOVEit Automation 2025.1.4 and earlier versions
  • MOVEit Automation 2025.0.8 and earlier versions
  • MOVEit Automation 2024.1.7 and prior versions

To address these issues, Progress Software has released new secure versions. Administrators are urged to upgrade using the official updates provided:

  • Upgrade to MOVEit Automation 2025.1.5 for the 2025.1 track
  • Upgrade to MOVEit Automation 2025.0.9 for the 2025.0 track
  • Upgrade to MOVEit Automation 2024.1.8 for the 2024.1 track

These updates can be downloaded by customers with an active maintenance agreement via the Progress Community portal. It’s crucial for organizations using unsupported software versions to transition to supported releases to maintain the security of their file transfer systems against these critical vulnerabilities.

Stay informed with our daily cybersecurity updates by following us on Google News, LinkedIn, and X. Contact us to share your stories.

Cyber Security News Tags:authentication bypass, Cybersecurity, data protection, enterprise software, IT security, MOVEit, Progress Software, security alert, software update, Vulnerability

Post navigation

Previous Post: OpenAI Unveils Enhanced ChatGPT Security Feature
Next Post: Critical cPanel Flaw Exploited Against Government Networks

Related Posts

Critical ChatGPT Flaw Exposed User Data to Attackers Critical ChatGPT Flaw Exposed User Data to Attackers Cyber Security News
Critical Flaw in ClawHub Allows Malicious Skill Ranking Manipulation Critical Flaw in ClawHub Allows Malicious Skill Ranking Manipulation Cyber Security News
New ConsentFix Attack Let Attackers Hijack Microsoft Accounts by Leveraging Azure CLI New ConsentFix Attack Let Attackers Hijack Microsoft Accounts by Leveraging Azure CLI Cyber Security News
MacOS Users Targeted by New Phishing Email Scam MacOS Users Targeted by New Phishing Email Scam Cyber Security News
Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware Cyber Security News
New SAP NetWeaver Vulnerabilities Allow Attackers to Bypass Authorization and Execute OS Commands New SAP NetWeaver Vulnerabilities Allow Attackers to Bypass Authorization and Execute OS Commands Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Flaw in FreeBSD DHCP Client Enables Remote Exploits
  • Linux ‘Copy Fail’ Vulnerability Exploited by Hackers
  • Critical cPanel Flaw Exploited Against Government Networks
  • Major MOVEit Security Flaw Prompts Urgent Software Update
  • OpenAI Unveils Enhanced ChatGPT Security Feature

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Flaw in FreeBSD DHCP Client Enables Remote Exploits
  • Linux ‘Copy Fail’ Vulnerability Exploited by Hackers
  • Critical cPanel Flaw Exploited Against Government Networks
  • Major MOVEit Security Flaw Prompts Urgent Software Update
  • OpenAI Unveils Enhanced ChatGPT Security Feature

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark