web analytics

MOVEit Transfer Software: Critical Zero-day Being Actively Exploited – Source: securityboulevard.com

moveit-transfer-software:-critical-zero-day-being-actively-exploited-–-source:-securityboulevard.com
#image_title
Rate this post

Source: securityboulevard.com – Author: Assura Team

Overview

Assura’s Security Operations Center is seeing active exploitation of a SQL Injection flaw in Progress Software’s MOVEit Transfer product first announced on May 31, 2023. The vulnerability is CVE-2023-34362.

Technical Analysis

Affected versions, fixed versions, and documentation to execute an upgrade to the patched versions are:

Assuras Take

There are two courses of action to take for this: PATCH NOW and hunt for signs of compromise. Organizations should search their MOVEit Transfer server(s) for the Indicators of Compromise (IOCs) listed in the Progress Software article about the vulnerability as well as the analysis published by Huntress (see the References section below).

The Assura SOC is actively monitoring for exploitation of this vulnerability and assisting clients with investigations. If you are an Assura Managed SIEM client and have any questions about this, please contact your Concierge.

References:

The post MOVEit Transfer Software: Critical Zero-day Being Actively Exploited appeared first on Assura, Inc..

*** This is a Security Bloggers Network syndicated blog from Assura, Inc. authored by Assura Team. Read the original post at: https://www.assurainc.com/blog/moveit-transfer-software-critical-zero-day-being-actively-exploited/

Original Post URL: https://securityboulevard.com/2023/06/moveit-transfer-software-critical-zero-day-being-actively-exploited/

Category & Tags: Security Bloggers Network,Cyber Heads-up – Security Bloggers Network,Cyber Heads-up

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post

More Latest Published Posts