From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation
Fortra披露了GoAnywhere MFT软件中存在严重漏洞CVE-2025-10035,该漏洞自2025年9月起被积极利用。公司迅速调查并联系受影响客户,发布热修复补丁和完整修复版本。该漏洞可能导致未授权命令注入,已有少量相关活动报告。 2025-10-10 11:42:0 Author: thehackernews.com(查看原文) 阅读量:10 收藏

Vulnerability / Network Security

Fortra on Thursday revealed the results of its investigation into CVE-2025-10035, a critical security flaw in GoAnywhere Managed File Transfer (MFT) that's assessed to have come under active exploitation since at least September 11, 2025.

The company said it began its investigation on September 11 following a "potential vulnerability" reported by a customer, uncovering "potentially suspicious activity" related to the flaw.

That same day, Fortra said it contacted on-premises customers who were identified as having their GoAnywhere admin console accessible to the public internet and that it notified law enforcement authorities about the incident.

DFIR Retainer Services

A hotfix for versions 7.6.x, 7.7.x, and 7.8.x of the software was made available the next day, with full releases incorporating the patch – versions 7.6.3 and 7.8.4 – made available on September 15. Three days later, a CVE for the vulnerability was formally published, it added.

"The scope of the risk of this vulnerability is limited to customers with an admin console exposed to the public internet," Fortra said. "Other web-based components of the GoAnywhere architecture are not affected by this vulnerability."

However, it conceded that there are a "limited number of reports" of unauthorized activity related to CVE-2025-10035. As additional mitigations, the company is recommending that users restrict admin console access over the internet, as well as enable monitoring and keep software up-to-date.

CVE-2025-10035 concerns a case of deserialization vulnerability in the License Servlet that could result in command injection without authentication. In a report earlier this week, Microsoft revealed that a threat it tracks as Storm-1175 has been exploiting the flaw since September 11 to deploy Medusa ransomware.

CIS Build Kits

That said, there is still no clarity on how the threat actors managed to obtain the private keys needed to exploit this vulnerability.

"The fact that Fortra has now opted to confirm (in their words) 'unauthorized activity related to CVE-2025-10035' demonstrates yet again that the vulnerability was not theoretical and that the attacker has somehow circumvented, or satisfied, the cryptographic requirements needed to exploit this vulnerability," watchTowr CEO and founder Benjamin Harris said.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2025/10/from-detection-to-patch-fortra-reveals.html
如有侵权请联系:admin#unsafe.sh