A high-severity safety vulnerability in Progress Software program’s MOVEit Switch software program might permit cyberattackers to get across the platform’s authentication mechanisms — and it is being actively exploited within the wild simply hours after it was made public.
MOVEit Switch is an utility for file sharing and collaboration in large-scale enterprises; it was infamously focused final yr in a rash of Cl0p ransomware assaults that affected no less than 160 victims, together with British Airways, the state of Maine, Siemens, UCLA, and extra. The extent of mass exploitation was such that it materially affected the outcomes of this yr’s “Information Breach Investigations Report” (DBIR) from Verizon.
The brand new bug (CVE-2024-5806, CVSS: 7.4) is an improper authentication vulnerability in MOVEit’s SFTP module that “can result in authentication bypass in restricted situations,” in accordance with Progress’ safety advisory on the difficulty immediately, which additionally consists of patching data. It impacts variations from 2023.0.0 earlier than 2023.0.11, from 2023.1.0 earlier than 2023.1.6, and from 2024.0.0 earlier than 2024.0.2 of MOVEit Switch.
Admins ought to patch the difficulty instantly — not solely is MOVEit on cybercriminals’ radar screens after the occasions of final yr, however the capability to entry inside recordsdata at Fortune 1000 firms is a juicy plum for any espionage-minded superior persistent menace (APT). And, in accordance with a quick notice from the nonprofit Shadowserver Basis, “very shortly after vulnerability particulars had been revealed immediately we began observing Progress MOVEit Switch CVE-2024-5806 POST /guestaccess.aspx exploit makes an attempt.” It additionally reported that there are no less than 1,800 uncovered cases on-line (although not all of them are weak).
Progress did not present any particulars on the bug, however researchers at watchTowr, who referred to as the vulnerability “actually weird,” have been in a position to decide two assault situations. In a single case, an attacker might carry out “pressured authentication” utilizing a malicious SMB server and a sound username (enabled by a dictionary-attack strategy).
In one other, extra harmful assault, a menace actor might impersonate any person on the system. “[We can] add our SSH public key to the server with out even logging in, after which use that key materials to permit us to authenticate as anybody we would like,” in accordance with watchTowr’s publish. “From right here, we are able to do something the person can do — together with studying, modifying, and deleting beforehand protected and sure delicate knowledge.”