By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Fortra Releases Critical Patch for CVSS 10.0 GoAnywhere MFT Vulnerability
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Fortra Releases Critical Patch for CVSS 10.0 GoAnywhere MFT Vulnerability
Tech News

Fortra Releases Critical Patch for CVSS 10.0 GoAnywhere MFT Vulnerability

By Viral Trending Content 3 Min Read
Share
SHARE

Sep 19, 2025Ravie LakshmananVulnerability / Threat Intelligence

Fortra has disclosed details of a critical security flaw in GoAnywhere Managed File Transfer (MFT) software that could result in the execution of arbitrary commands.

The vulnerability, tracked as CVE-2025-10035, carries a CVSS score of 10.0, indicating maximum severity.

“A deserialization vulnerability in the License Servlet of Fortra’s GoAnywhere MFT allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection,” Fortra said in an advisory released Thursday.

The company also noted that successful exploitation of the vulnerability is dependent on the system being publicly accessible over the internet.

Users are advised to update to the patched release – version 7.8.4, or the Sustain Release 7.6.3 – to safeguard against potential threats. If immediate patching is not possible, it’s advisable to ensure that access to the GoAnywhere Admin Console is not open to the public.

CIS Build Kits

Fortra makes no mention of the flaw being exploited in the wild. That said, previously disclosed shortcomings in the same product (CVE-2023-0669, CVSS score: 7.2) were abused as a zero-day by ransomware actors to steal sensitive data.

Then, early last year, it addressed another critical vulnerability in the GoAnywhere MFT (CVE-2024-0204, CVSS score: 9.8) that could have been exploited to create new administrator users.

“The newly disclosed vulnerability in Fortra’s GoAnywhere MFT solution impacts the same license code path in the Admin Console as the earlier CVE-2023-0669, which was widely exploited by multiple ransomware and APT groups in 2023, including LockBit,” Ryan Dewhurst, head of proactive threat intelligence at watchTowr, said in a statement shared with The Hacker News.

“With thousands of GoAnywhere MFT instances exposed to the Internet, this issue is almost certain to be weaponized for in-the-wild exploitation soon. While Fortra notes exploitation requires external exposure, these systems are generally Internet-facing by design, so organizations should assume they are vulnerable. Organizations should apply the official patches immediately and take steps to restrict external access to the Admin Console.”

You Might Also Like

The ‘Surge’ of Troops May Not Come to San Francisco, but the City Is Ready Anyway

Dublin aquatech PT Aqua named BIM Business of the Year 2025

The Truth About the Meta Display Glasses

USB-C Chargers: How to Choose the Best One

Secure AI at Scale and Speed — Learn the Framework in this Free Webinar

TAGGED: Cyber Security, Cybersecurity, data breach, Fortra, GoAnywhere, Internet, Patch Management, Ransomware, software security, Threat Intelligence, Vulnerability, Zero-Day
Share This Article
Facebook Twitter Copy Link
Previous Article Amazon Wants You to Ditch Your Old Laptop and Upgrade to the New MacBook Air at a Record Low
Next Article Tampa Bay’s offensive line has been ravaged by injuries early in the 2025 season
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

European lawmakers call for end to EU support for all Libyan security forces
World News
With $1 trillion pay package on the line, Elon Musk blasts influential firms telling shareholders to reject it: ‘Those guys are corporate terrorists’
Business
ARC Raiders Server Slam Had 30 Million Rounds Played, Over 800,000 Rubber Ducks Found
Gaming News
The ‘Surge’ of Troops May Not Come to San Francisco, but the City Is Ready Anyway
Tech News
Dolphins’ Darren Waller (pectoral) has been placed on the IR for Miami
Sports
Counter-Strike cosmetics economy loses nearly $2 billion in value overnight
Gaming News
DeFi Security Crisis: Bunni DEX Folds After Major Exploit, Leaving Users Empty-Handed
Crypto

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

European lawmakers call for end to EU support for all Libyan security forces

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
European lawmakers call for end to EU support for all Libyan security forces
October 24, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?