CyberWatch

Critical Vulnerability in Fortra GoAnywhere MFT

By

By

Access Point Consulting

Summary

Vulnerability CVE-2024-0204 has been found in Fortra GoAnywhere Managed File Transfer software. It allows an unauthorized user to create an admin account via its administration portal. This gives the attacker administrative rights over the tool, allowing them to execute commands, edit configurations, upload files, and more. Horizon3ai has created PoC exploit code for this vulnerability to help the security professionals develop a patch or other mitigation measure to address the issue.

Impact Assessment

Forta has designated this vulnerability a CVSS 3.1, with a base score of 9.8 Critical. Proof-of-concept exploit code exists and uses a weakness in MFT’s path traversal. There is no proof that CVE-2024-0204 has been exploited in the wild, but a ransomware attack was successful against the same MFT application last year. Due to the high base score and the existence of proof-of-concept code, this vulnerability has a high risk of exploitation.

What it means for you

Check if your environment contains Forta MFT and if it does, remediate as necessary.

Remediation

Update your instance of Fortra GoAnywhere MFT to version 7.4.1 or higher to remediate this vulnerability.

Mitigate: If upgrading to 7.4.1 is not an option for your organization, mitigation techniques are available for container and non-container deployments, as follows:

  • This vulnerability can be eliminated in non-container deployments by deleting the InitialAccountSetup.xhtml file in the install directory and restarting the services.
  • This vulnerability can be eliminated in container deployed instances by replacing the InitialAccountSetup.xhtml file with an empty one and restarting.

Business Implications

The presence of this vulnerability in any environment should be a priority concern. If exploited, disruption of your organization’s data and day-to-day operations would likely ensue, leading to monetary loss, data loss or leakage, which could hurt your business’ reputation.

Access Point Technology Recommends

Patch: If your organization's version of Forta MFT is below 7.4.1, upgrade to the latest version. Follow the above remediation section with mitigations.

Associated Bulletins

https://www.fortra.com/security/advisory/fi-2024-001

https://github.com/horizon3ai/CVE-2024-0204/blob/main/README.md

https://www.horizon3.ai/cve-2024-0204-fortra-goanywhere-mft-authentication-bypass-deep-dive/

Resources

Trending Articles & Security Reports

Resources

CyberWatch

September 19, 2024

Stealing the Show: From Competitor to Threat Actor

In December 2020, Ticketmaster was hit with a $10 million fine for an act of corporate espionage. The company had engaged in unauthorized access to a competitor's computer systems, using stolen login credentials to gather confidential business intelligence. Although this scandal broke nearly four years ago, it serves as a reminder of the legal and ethical responsibilities businesses must adhere to in today’s marketplace.

Find out more
September 18, 2024

Adobe Patched Potential Zero-Day in Reader

Adobe released a patch for a suspected zero-day vulnerability in Adobe Reader, identified as CVE-2024-41869. This vulnerability, a Use After Free (UAF) issue, can lead to arbitrary code execution, system crashes, or the return of unexpected values.

Find out more
September 16, 2024

Why We Need NIST's Post-Quantum Cryptography Standards

Last month, NIST published its first set of post-quantum cryptography (PQC) standards, setting a new benchmark for enterprises, government agencies, and vendors to withstand future cyberattacks from quantum computers. The time to start transitioning is now. Discover what’s at stake with CyberWatch.

Find out more