Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2.
https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml#zerodayfeb1
https://infosec.exchange/@briankrebs/109795710941843934
https://duo.com/decipher/fortra-patches-actively-exploited-zero-day-in-goanywhere-mft
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-317a
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-207a
https://blog.talosintelligence.com/common-ransomware-actor-ttps-playbooks/
https://research.checkpoint.com/2024/sharp-dragon-expands-towards-africa-and-the-caribbean/
Published: 2023-02-06
Updated: 2025-02-04
Named Vulnerability: GoAnywhere MFTNamed Vulnerability: Fortra GoAnywhere MFTKnown Exploited Vulnerability (KEV)
Base Score: 8.3
Vector: CVSS2#AV:N/AC:L/Au:M/C:C/I:C/A:C
Severity: High
Base Score: 7.2
Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Severity: High
EPSS: 0.94364