Emergency patch released for actively exploited GoAnywhere MFT zero-day

Emergency patch released for actively exploited GoAnywhere MFT zero-day

Fortra has released an emergency fix, version 7.1.2, to address a zero-day vulnerability in the GoAnywhere MFT secure file transfer protocol that has been actively exploited by hackers.

The zero-day bug resides in the administrative web interface and could be exploited by a remote attacker to achieve remote code execution via a malicious request. In most cases, the administrator console is not exposed to the internet and should only be accessible via a private internal network or by an allow-listed IP address.

“Due to the nature of the attack, it is critical to note that every managed credential within your GoAnywhere environment should be considered potentially compromised. This includes passwords and keys used to access any external systems with which GoAnywhere is integrated. Ensure that all credentials have been revoked from those external systems and review relevant access logs related to those systems. This also includes passwords and keys used to encrypt files within the system,” Fortra said in a security advisory (available only via a free account).

According to a Shodan search query, there are nearly 1,000 GoAnywhere instances exposed on the internet.

Earlier this week, a proof-of-concept (PoC) code was released that could be used to achieve remote code execution on Internet-exposed and unpatched GoAnywhere MFT servers.

Back to the list

Latest Posts

Cyber Security Week in Review: April 25, 2025

Cyber Security Week in Review: April 25, 2025

In brief: A SAP NetWeaver zero-day bug exploited in the wild, DslogdRAT exploits a recent Ivanti flaw, and more.
25 April 2025
ToyMaker: Financially-motivated IAB that sells access to ransomware gangs

ToyMaker: Financially-motivated IAB that sells access to ransomware gangs

ToyMaker is believed to be behind the custom backdoor dubbed ‘LAGTOY.’
24 April 2025
DragonForce and Anubis ransomware ops use novel models to attract affiliates and boost profits

DragonForce and Anubis ransomware ops use novel models to attract affiliates and boost profits

DragonForce introduced a distributed affiliate branding model.
23 April 2025