After the storm MOVEit: new Progress Software bugs have become another company crisis

CarderPlanet

Professional
Messages
2,552
Reaction score
696
Points
83
Will hackers take on critical flaws or will users have time to upgrade?

Progress Software, the developer of the MOVEit Transfer file-sharing platform that has recently been the target of massive data theft cyberattacks, has called on its customers to address a critical vulnerability in the WS_FTP Server software.

According to the company, thousands of IT teams around the world use WS_FTP Server enterprise software for secure file transfer. Progress has now revealed several vulnerabilities affecting the manager interface and the Ad Hoc Transfer module of this software.

This week, WS_FTP Server vulnerabilities were fixed, two of which were assessed as critical:
  • CVE-2023-40044 (CVSS: 10) allows an unauthenticated hacker to execute remote commands after successfully exploiting a deserialization vulnerability .NET in the Ad Hoc Transfer module.
  • CVE-2023-42657 (CVSS: 9.9) is a directory traversal vulnerability that allows a cybercriminal to perform file operations outside the authorized WS_FTP folder path. As noted by Progress, a hacker can also get out of the context of the WS_FTP Server file structure and perform the same operations (delete, rename, delete directories, create new directories) on the location of files and folders in the underlying operating system.

It is noted that a cybercriminal can exploit both disadvantages in attacks with low complexity, which do not require user interaction.

Progress recommends that users upgrade to the latest patched version 8.8.2 as the only way to fix the issues. It is noted that during the update, the system will crash. Information was also provided on how to remove or disable the vulnerable Ad Hoc Transfer module if it is not used.

It should be noted that Progress is still struggling with the consequences of a series of attacks that began with the zero-day operation of the MOVEit Transfer platform to steal data from vulnerable networks. Major corporations and U.S. government agencies, including the U.S. Department of Energy , Shell , Deutsche Bank, and PwC, are among those affected .
 
Top