Description

A critical security vulnerability was discovered in Fortra's GoAnywhere Managed File Transfer (MFT) product, labeled CVE-2025-10035, with a CVSS score of 10.0. This is a bug about a deserialization vulnerability in the License Servlet section that allows an attacker to execute whatever commands they please. The exploit is based on the ability of the attacker to construct a spoofed valid license response signature. Even though Fortra is yet to report any actual attacks exploiting the weakness, similar previous issues in the software have been exploited by attackers, including ransom gangs, in order to steal sensitive information. The reason for this vulnerability is the way the application verifies licenses. It incorrectly verifies input upon opening data, allowing attackers to embed malicious objects that are capable of running remotely. This particular method of attacking aims at the same license code that was exploited earlier in CVE-2023-0669, a documented vulnerability that was exploited in actual attacks. Because there are numerous GoAnywhere MFT systems that are internet-connected, it is highly probable that the new vulnerability will be attacked, particularly since there are past attacks against the software and it was not promptly patched. In order to mitigate the risk, Fortra issued patches in version 7.8.4 and Sustain Release 7.6.3 and users are advised to implement them immediately. In case it is not feasible to update today, there is a need to restrict the public from accessing the GoAnywhere Admin Console. Organizations need to treat this vulnerability as serious and conduct a re-check of their risk, particularly for systems that are accessible over the internet.