Progress Software Issues Security Alert for MOVEit Transfer Users: CVE-2024-6576

CVE-2024-6576

Progress Software, the developer of the popular MOVEit Transfer managed file transfer solution, has warned customers about a new high-severity vulnerability (CVE-2024-6576) that could allow attackers to escalate privileges within the system. The flaw, stemming from improper authentication mechanisms, affects several versions of MOVEit Transfer released in 2023 and 2024.

While the company has assured users that MOVEit Cloud clusters have been patched, on-premises installations are at immediate risk. Given the widespread use of MOVEit in enterprise environments, this vulnerability is a prime target for threat actors looking to gain unauthorized access to sensitive data and systems.

Who is Affected

The following versions of MOVEit Transfer are susceptible to CVE-2024-6576:

  • MOVEit Transfer 2023.0.0 to 2023.0.11
  • MOVEit Transfer 2023.1.0 to 2023.1.6
  • MOVEit Transfer 2024.0.0 to 2024.0.2

What to Do

Progress Software strongly recommends upgrading to the latest patched versions:

  • MOVEit Transfer 2024.0.3 (16.0.3)
  • MOVEit Transfer 2023.1.7 (15.1.7)
  • MOVEit Transfer 2023.0.12 (15.0.12)

Users should prioritize applying these updates immediately to minimize the risk of exploitation. Additionally, organizations are advised to monitor their MOVEit Transfer logs for any suspicious activity and implement additional security measures, such as network segmentation and intrusion detection systems, to further protect their environments.

The urgency of patching this vulnerability is heightened by the history of MOVEit Transfer as a target for cybercriminals. In a notorious incident last year, the Clop ransomware gang exploited a zero-day vulnerability in MOVEit to breach and extort thousands of organizations. This latest discovery underscores the need for continuous vigilance and proactive security measures.

Related Posts: