A critical security vulnerability was discovered in Fortra's GoAnywhere Managed File Transfer (MFT) product, labeled CVE-2025-10035, with a CVSS score of 10.0. This is a bug about a deserialization vulnerability in the License Servlet section that allows an attacker to execute whatever commands they please. The exploit is based on the ability of the attacker to construct a spoofed valid license response signature. Even though Fortra is yet to report any actual attacks exploiting the weakness, similar previous issues in the software have been exploited by attackers, including ransom gangs, in order to steal sensitive information. The reason for this vulnerability is the way the application verifies licenses. It incorrectly verifies input upon opening data, allowing attackers to embed malicious objects that are capable of running remotely. This particular method of attacking aims at the same license code that was exploited earlier in CVE-2023-0669, a documented vulnerability that was exploited in actual attacks. Because there are numerous GoAnywhere MFT systems that are internet-connected, it is highly probable that the new vulnerability will be attacked, particularly since there are past attacks against the software and it was not promptly patched. In order to mitigate the risk, Fortra issued patches in version 7.8.4 and Sustain Release 7.6.3 and users are advised to implement them immediately. In case it is not feasible to update today, there is a need to restrict the public from accessing the GoAnywhere Admin Console. Organizations need to treat this vulnerability as serious and conduct a re-check of their risk, particularly for systems that are accessible over the internet.
A sophisticated malware campaign has emerged leveraging the Ethereum blockchain to conceal and manage a stealthy Node.js backdoor known as EtherRAT. Security researchers observed a...
Microsoft has introduced a new privacy feature in Microsoft Teams that automatically removes EXIF metadata from images shared in chats and channels. EXIF data often contains sensit...
CERT-UA has reported a large-scale phishing campaign in which threat actors impersonated the agency to distribute a remote access trojan (RAT) known as AGEWHEEZE. The campaign, att...