Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation

Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation

Posted on October 10, 2025October 10, 2025 By CWS

Oct 10, 2025Ravie LakshmananVulnerability / Community Safety
Fortra on Thursday revealed the outcomes of its investigation into CVE-2025-10035, a essential safety flaw in GoAnywhere Managed File Switch (MFT) that is assessed to have come beneath lively exploitation since not less than September 11, 2025.
The corporate mentioned it started its investigation on September 11 following a “potential vulnerability” reported by a buyer, uncovering “probably suspicious exercise” associated to the flaw.
That very same day, Fortra mentioned it contacted on-premises prospects who have been recognized as having their GoAnywhere admin console accessible to the general public web and that it notified legislation enforcement authorities concerning the incident.

A hotfix for variations 7.6.x, 7.7.x, and seven.8.x of the software program was made out there the following day, with full releases incorporating the patch – variations 7.6.3 and seven.8.4 – made out there on September 15. Three days later, a CVE for the vulnerability was formally printed, it added.
“The scope of the chance of this vulnerability is proscribed to prospects with an admin console uncovered to the general public web,” Fortra mentioned. “Different web-based parts of the GoAnywhere structure aren’t affected by this vulnerability.”
Nonetheless, it conceded that there are a “restricted variety of studies” of unauthorized exercise associated to CVE-2025-10035. As extra mitigations, the corporate is recommending that customers prohibit admin console entry over the web, in addition to allow monitoring and preserve software program up-to-date.
CVE-2025-10035 issues a case of deserialization vulnerability within the License Servlet that would end in command injection with out authentication. In a report earlier this week, Microsoft revealed {that a} menace it tracks as Storm-1175 has been exploiting the flaw since September 11 to deploy Medusa ransomware.

That mentioned, there may be nonetheless no readability on how the menace actors managed to acquire the personal keys wanted to use this vulnerability.
“The truth that Fortra has now opted to substantiate (of their phrases) ‘unauthorized exercise associated to CVE-2025-10035’ demonstrates but once more that the vulnerability was not theoretical and that the attacker has someway circumvented, or glad, the cryptographic necessities wanted to use this vulnerability,” watchTowr CEO and founder Benjamin Harris mentioned.

The Hacker News Tags:CVE202510035, Exploitation, Fortra, Full, Reveals, Timeline

Post navigation

Previous Post: Critical GitHub Copilot Vulnerability Let Attackers Exfiltrate Source Code From Private Repos
Next Post: Microsoft Defender Incorrectly Flags SQL Server Software as End-of-life

Related Posts

Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps The Hacker News
Microsoft Windows Vulnerability Exploited to Deploy PipeMagic RansomExx Malware Microsoft Windows Vulnerability Exploited to Deploy PipeMagic RansomExx Malware The Hacker News
Nation-State Hacks, Spyware Alerts, Deepfake Malware, Supply Chain Backdoors Nation-State Hacks, Spyware Alerts, Deepfake Malware, Supply Chain Backdoors The Hacker News
China-Linked Hackers Exploit New VMware Zero-Day Since October 2024 China-Linked Hackers Exploit New VMware Zero-Day Since October 2024 The Hacker News
Helping CISOs Speak the Language of Business Helping CISOs Speak the Language of Business The Hacker News
Speagle Malware Exploits Security Software for Data Theft Speagle Malware Exploits Security Software for Data Theft The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark