iTnews Asia
  • Home
  • News
  • Security

Progress Software moves on another MOVEit vulnerability

Progress Software moves on another MOVEit vulnerability

Irresponsible disclosure by third party.

By Richard Chirgwin on Jun 19, 2023 11:46AM

Progress Software’s ongoing MOVEit saga continued late last week, with the company moving to patch another security vulnerability in its managed file transfer software.

Advising that it had patched an SQLi bug designated CVE-2023-35708, Progress Software said the party that found the bug “did not follow normal industry standards”.

“Because it is common across the industry that reported vulnerabilities lead to increased attention from both malicious threat actors and cyber security researchers trying to uncover new vulnerabilities, we are working closely with our industry partners to take all appropriate steps to address any issues,” the company said.

NIST’s advisory said the bug “could allow an unauthenticated attacker to gain unauthorised access to MOVEit Transfer's database."

"An attacker could submit a crafted payload to a MOVEit Transfer application endpoint that could result in modification and disclosure of MOVEit database content," NIST stated.

When it discovered the bug, Progress disabled HTTPs traffic on MOVEit Cloud, and asked customers “to take down their HTTP and HTTPs traffic to safeguard their environments”.

Progress said it has not seen any evidence that the new vulnerability was being exploited, and has updated a knowledge base article to tell customers how to apply the latest patch.

Problems with MOVEit first emerged early in June, with victims of the earlier bug including British Airways, the BBC, and several unnamed US government agencies.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
moveit progress software security

Related Articles

  • Five tips a CIO or CSO should know to stop employee-driven IP theft
  • StarHub launches app to protect customers from scam calls and SMS
  • Beware the rise of ‘vishing’ as a cyber threat in APAC
  • Proofpoint CEO: A tool-based approach for cybersecurity is impractical
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Five tips a CIO or CSO should know to stop employee-driven IP theft

Five tips a CIO or CSO should know to stop employee-driven IP theft

How can we bolster our resilience against AI-enabled e-mail attacks?

How can we bolster our resilience against AI-enabled e-mail attacks?

The real-life Tom & Jerry chase

The real-life Tom & Jerry chase

Beware the rise of ‘vishing’ as a cyber threat in APAC

Beware the rise of ‘vishing’ as a cyber threat in APAC

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.