CVE-2025-10035
GoAnywhere MFT 취약성 분석 및 완화

개요

A critical deserialization vulnerability (CVE-2025-10035) was discovered in the License Servlet of Fortra's GoAnywhere MFT. The vulnerability, disclosed on September 18, 2025, allows an attacker with a validly forged license response signature to deserialize an arbitrary actor-controlled object, potentially leading to command injection. The vulnerability affects versions prior to 7.8.4 and 7.6.3 of GoAnywhere MFT and has received a maximum CVSS score of 10.0 (Fortra Advisory, NVD).

기술적 세부 사항

The vulnerability exists in the License Servlet component exposed at /goanywhere/lic/accept/. The flaw involves a complex authentication bypass of the License Servlet through manipulation of the license request token validation process. An attacker can bypass authentication requirements by appending invalid data to specific endpoints and triggering exceptions that lead to the generation of valid license request tokens. This allows access to the vulnerable deserialization routine (WatchTowr Labs).

영향

The vulnerability allows attackers to achieve remote code execution and create backdoor admin accounts in affected systems. Given that GoAnywhere MFT is deployed in Fortune 500 companies with over 20,000 instances exposed to the Internet, the potential impact is severe. The solution's role in handling sensitive file transfers makes it an particularly attractive target for threat actors (Arctic Wolf).

완화 및 해결 방법

Organizations are strongly advised to upgrade to the fixed versions: 7.8.4 (latest release) or 7.6.3 (sustain release). Additionally, Fortra recommends ensuring that the GoAnywhere Admin Console is not publicly accessible from the internet, as exploitation is highly dependent on systems being externally exposed (Arctic Wolf).

커뮤니티 반응

The security community has expressed significant concern about this vulnerability, particularly given GoAnywhere's history with previous critical vulnerabilities like CVE-2023-0669 that led to widespread compromises by the cl0p ransomware gang. There has also been criticism of Fortra's handling of the disclosure, particularly regarding transparency about in-the-wild exploitation despite being a signatory of CISA's Secure By Design pledge (WatchTowr Labs).

추가 자료


근원이 보고서는 AI를 사용하여 생성되었습니다.

관련 GoAnywhere MFT 취약점:

CVE ID

심각도

점수

기술

구성 요소 이름

CISA KEV 익스플로잇

수정 사항이 있습니다.

게시된 날짜

CVE-2025-10035CRITICAL9.8
  • GoAnywhere MFTGoAnywhere MFT
  • cpe:2.3:a:fortra:goanywhere_managed_file_transfer
Sep 18, 2025
CVE-2024-11922MEDIUM5.4
  • GoAnywhere MFTGoAnywhere MFT
  • cpe:2.3:a:fortra:goanywhere_managed_file_transfer
아니요Apr 28, 2025
CVE-2025-3871MEDIUM5.3
  • GoAnywhere MFTGoAnywhere MFT
  • cpe:2.3:a:fortra:goanywhere_managed_file_transfer
아니요Jul 16, 2025
CVE-2024-9945MEDIUM5.3
  • GoAnywhere MFTGoAnywhere MFT
  • cpe:2.3:a:fortra:goanywhere_managed_file_transfer
아니요Dec 13, 2024
CVE-2025-0049MEDIUM4.3
  • GoAnywhere MFTGoAnywhere MFT
  • cpe:2.3:a:fortra:goanywhere_managed_file_transfer
아니요Apr 28, 2025

무료 취약성 평가

클라우드 보안 태세를 벤치마킹합니다

9개의 보안 도메인에서 클라우드 보안 관행을 평가하여 위험 수준을 벤치마킹하고 방어의 허점을 식별합니다.

평가 요청

추가 Wiz 리소스

맞춤형 데모 받기

맞춤형 데모 신청하기

"내가 본 최고의 사용자 경험은 클라우드 워크로드에 대한 완전한 가시성을 제공합니다."
데이비드 에슬릭최고정보책임자(CISO)
"Wiz는 클라우드 환경에서 무슨 일이 일어나고 있는지 볼 수 있는 단일 창을 제공합니다."
아담 플레처최고 보안 책임자(CSO)
"우리는 Wiz가 무언가를 중요한 것으로 식별하면 실제로 중요하다는 것을 알고 있습니다."
그렉 포니아토프스키위협 및 취약성 관리 책임자