CISA Flagged Vulnerabilities in Enterprise File Transfer Systems
📰 News

CISA Flagged Vulnerabilities in Enterprise File Transfer Systems

CISA has identified critical vulnerabilities in enterprise file transfer systems that attackers are actively exploiting. Organizations must immediately patch these flaws to prevent data breaches and system compromises.

CISA vulnerabilitiesenterprise file transfer securityfile transfer vulnerabilitiesCISA KEV catalogsecure file transfer systems

# CISA Flagged Vulnerabilities in Enterprise File Transfer Systems

*Critical security flaws in widely-deployed file transfer solutions demand immediate administrative attention*

Enterprise file transfer systems have become critical infrastructure for organizations worldwide, facilitating the secure exchange of sensitive data across business networks. Recent additions to the Cybersecurity and Infrastructure Security Agency's (CISA) Known Exploited Vulnerabilities (KEV) catalog have brought renewed urgency to securing these systems, as threat actors increasingly target file transfer applications to gain initial access and exfiltrate valuable corporate data.

What Happened

CISA has flagged multiple critical vulnerabilities affecting enterprise file transfer systems, adding them to the KEV catalog—a designation reserved for vulnerabilities actively exploitedActively Exploited🛡️A vulnerabilityVulnerability🛡️A weakness in software, hardware, or processes that can be exploited by attackers to gain unauthorized access or cause harm. that attackers are currently using in real-world attacks, requiring immediate patching regardless of severity score. in the wild. This action signals that threat actors are not merely theorizing about potential exploits but are actively weaponizing these flaws in real-world attack campaigns.

The vulnerabilities span several popular enterprise file transfer solutions, including Progress MOVEit Transfer, Fortra's GoAnywhere MFT, and Aspera Faspex. These systems handle sensitive file transfers for thousands of organizations globally, making them high-value targets for cybercriminals and nation-state actors alike.

The MOVEit Transfer vulnerability (CVE-2023-34362) represents a SQL injection flaw that enables unauthenticated attackers to gain unauthorized database access. Discovered in May 2023, this vulnerability was exploited by the Cl0p ransomware group in a massive campaign affecting hundreds of organizations. The attack vector allowed threat actors to extract sensitive data from MOVEit Transfer databases without requiring authentication credentials, representing a catastrophic security failure in a system specifically designed to protect sensitive information.

The GoAnywhere MFT vulnerability (CVE-2023-0669) involves a remote code execution flaw in the administrative interface. This pre-authentication command injectionCommand Injection🛡️A security vulnerability that allows attackers to execute arbitrary operating system commands on the host system through a vulnerable application. vulnerability enabled attackers to create unauthorized administrative accounts and execute arbitrary code on vulnerable systems. The Cl0p ransomware group also exploited this vulnerability, demonstrating a coordinated campaign targeting multiple file transfer platforms simultaneously.

Aspera Faspex (CVE-2022-47986) contains a YAML deserializationDeserialization🛡️The process of converting stored or transmitted data back into an object. Insecure deserialization can allow attackers to execute code by manipulating serialized data. vulnerability leading to remote code execution. This flaw affects versions prior to 4.4.2 PatchPatch🛡️A software update that fixes security vulnerabilities, bugs, or adds improvements to an existing program. Level 2 and allows unauthenticated attackers to execute arbitrary commands on the underlying operating system by sending specially crafted API requests.

These vulnerabilities share several concerning characteristics: they allow unauthenticated remote code execution or data access, they affect internet-facing systems handling sensitive corporate data, and they have been actively exploited by sophisticated threat actor groups with demonstrated capabilities in large-scale data theft operations.

CISA's KEV designation requires Federal Civilian Executive Branch (FCEB) agencies to remediate these vulnerabilities within specified timeframes, typically 14-21 days from catalog inclusion. While this mandate applies specifically to federal agencies, CISA strongly recommends all organizations prioritize addressing KEV-listed vulnerabilities regardless of sector.

Who Is Affected

The scope of affected organizations spans virtually every industry sector that relies on secure file transfer capabilities for business operations.

**Healthcare Organizations**: Hospitals, health systems, insurance companies, and pharmaceutical manufacturers use file transfer systems to exchange protected health information (PHI), medical imaging data, insurance claims, and research data. The healthcare sector represents one of the most heavily impacted industries, with multiple major health systems confirming data breaches resulting from MOVEit Transfer exploitation.

**Financial Services**: Banks, credit unions, investment firms, and payment processors utilize enterprise file transfer systems for regulatory reporting, inter-institutional transactions, customer data management, and financial statement distribution. The sensitivity of financial data makes these organizations particularly attractive targets.

**Government Agencies**: Federal, state, and local government entities use file transfer systems to exchange citizen data, tax information, law enforcement records, and inter-agency communications. Multiple state governments and federal contractors have confirmed compromise through these vulnerabilities.

**Educational Institutions**: Universities, school districts, and educational service providers transfer student records, research data, financial aid information, and human resources documents through these platforms.

**Professional Services**: Legal firms, accounting practices, consulting companies, and human resources service providers routinely transfer highly sensitive client information through enterprise file transfer systems.

**Specific Product Versions Affected**:

  • **Progress MOVEit Transfer**: All versions prior to 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1)
  • **Fortra GoAnywhere MFT**: Versions prior to 7.1.2 with the administrative interface exposed to network access
  • **IBM Aspera Faspex**: All versions prior to 4.4.2 Patch Level 2
  • Additionally, organizations using managed file transfer services from third-party providers may be indirectly affected if their service providers operate vulnerable systems. Several major managed service providers and cloud hosting companies have confirmed their infrastructure was compromised through these vulnerabilities, creating downstream impacts for their customers.

    The attack surface extends beyond organizations directly operating these systems. Any entity that transfers data through a partner, vendor, or service provider running vulnerable file transfer infrastructure faces potential data exposure. This supply chain dimension significantly expands the affected population beyond organizations directly managing these platforms.

    Technical Analysis

    Understanding the technical mechanisms of these vulnerabilities is essential for security professionals implementing comprehensive defensive measures.

    **MOVEit Transfer SQL Injection (CVE-2023-34362)**

    This vulnerability exists in the MOVEit Transfer web application's handling of user input in specific HTTP parameters. The application failed to properly sanitize input before incorporating it into SQL queries, creating a classic SQL injection vulnerability.

    The vulnerable endpoint accepts specially crafted HTTP POST requests containing malicious SQL code within specific parameter values. Attackers exploited this by injecting SQL commands that:

    1. Created new database records for unauthorized user accounts with administrative privileges 2. Extracted sensitive data from the application's database tables 3. Wrote web shells to the file system through SQL Server's `xp_cmdshell` functionality 4. Bypassed authentication mechanisms entirely

    The technical sophistication of observed attacks indicates threat actors had detailed knowledge of MOVEit's database schema and internal application architecture. Attackers specifically targeted tables containing authentication credentials, audit logs, and file transfer metadataMetadata📖Data about data—like email timestamps, file sizes, or location tags on photos..

    Forensic analysis of compromised systems revealed attackers deployed a custom web shell (dubbed "LEMURLOOT" by security researchers) designed specifically for MOVEit Transfer environments. This web shell provided capabilities for:

  • Database enumeration and data exfiltrationData Exfiltration🛡️The unauthorized transfer of data from a computer or network, often performed by attackers before deploying ransomware to enable double extortion.
  • File system access and modification
  • Credential harvesting from memory
  • Log deletion to obscure attacker activity
  • **GoAnywhere MFT Remote Code Execution (CVE-2023-0669)**

    This pre-authentication remote code execution vulnerability exists in GoAnywhere MFT's administrative portal when exposed to network access. The flaw stems from insufficient input validation in the License Response Servlet component.

    Attackers could send specially crafted HTTP requests to the administrative interface containing serialized Java objects. The application's deserialization of these untrusted objects resulted in arbitrary code execution within the application's security context.

    The vulnerability allowed attackers to:

    1. Execute operating system commands with the privileges of the GoAnywhere service account 2. Create administrative user accounts for persistent access 3. Access the application's database containing file transfer logs and credentials 4. Modify application configurations to disable security features

    Security researchers observed attackers deploying additional persistence mechanisms including scheduled tasks, SSH keys, and reverse shell connections to command-and-control infrastructure.

    **Aspera Faspex YAML Deserialization (CVE-2022-47986)**

    This vulnerability affects Aspera Faspex's package sending functionality. The application uses YAML deserialization to process certain API requests but fails to restrict the types of objects that can be instantiated during deserialization.

    Attackers can send malicious YAML payloads to the `/aspera/faspex/package_relay` endpoint that, when deserialized, instantiate arbitrary Ruby objects and execute attacker-controlled code. This results in complete system compromise with the privileges of the Faspex application.

    **Common Attack Pattern Analysis**

    Across all three vulnerabilities, threat actors followed consistent operational patterns:

    1. **Initial Reconnaissance**: Automated scanning to identify vulnerable internet-facing instances 2. **Exploitation**: Deployment of exploitExploit🛡️Code or technique that takes advantage of a vulnerability to cause unintended behavior, such as gaining unauthorized access. code targeting the specific vulnerability 3. **Persistence Establishment**: Creation of unauthorized accounts and deployment of web shells 4. **Credential Harvesting**: Extraction of authentication credentials from databases and memory 5. **Data Exfiltration**: Mass download of files and database contents 6. **Evidence Removal**: Deletion or modification of logs to obscure attacker activity

    Network traffic analysis reveals attackers typically completed the entire attack chain within hours of initial compromise, emphasizing the need for rapid detection and response capabilities.

    Immediate Actions Required

    IT administrators must implement the following actions immediately to address these critical vulnerabilities:

    Emergency Assessment

  • [ ] Inventory all file transfer systems in your environment, including those