Description

A dangerous authentication bypass vulnerability (CVE-2024-5806) has been discovered in Progress Software's MOVEit Transfer and MOVEit Cloud applications. This security risk allows attackers to bypass authentication restrictions and obtain unauthorized access to sensitive data. Active exploitation efforts were noticed soon after the publication of this vulnerability, leading to fears that many attacks will follow. This vulnerability occurs due to the SFTP component of MOVEit Transfer software, which suffers from poor validation in the authentication routine used. Consequently, attackers can manipulate parameters to bypass the need for authenticating themselves on the targeted machine. An analysis of this problem has shown that this vulnerability is related to ineffective authentication logic (CWE-287), which lets hackers pretend to be real users and make changes to files. Additionally, attackers can try various methods of capturing authentication hashes or use the specific flow of SFTP to elevate privileges. The availability of the working code of this exploit has triggered more exploitation attempts. In fact, security specialists have confirmed successful exploitation attempts, which makes patching even more necessary. Considering that MOVEit software is used by enterprises for transferring sensitive information, this vulnerability attracts attention from threat actors.