Critical Vulnerability in Fortra GoAnywhere MFT Exploited by Attackers

The Fortra GoAnywhere MFT tool, widely used for file transfers, has been under active exploitation since September 10, 2025, through the critical vulnerability CVE-2025-10035, with the maximum CVSS score of 10.0. The flaw allows attackers to execute arbitrary commands without authentication via a deserialization vulnerability in the License Servlet component, completely compromising systems with the administration console exposed to the internet.

CISA officially confirmed the exploitation this Monday, mandating remediation by October 20 for U.S. federal agencies, while researchers from watchTowr Labs identified that attackers had created backdoor administrative accounts in vulnerable instances a week before Fortra’s public disclosure.

The situation is particularly critical considering that, according to watchTowr, more than 20,000 GoAnywhere instances are accessible over the internet. The complexity of the current attack is considered low, requires no user interaction, and has already been observed being used to deploy malicious payloads after the creation of unauthorized web user accounts.

All versions of GoAnywhere MFT prior to 7.8.4 and 7.6.3 (Sustain Release) are vulnerable. Fortra has released security patches, and organizations unable to apply them immediately should ensure the administration console is not publicly exposed to the internet.

Recommendations:

  • Immediately update GoAnywhere MFT to versions 7.8.4 or 7.6.3 (Sustain Release), which contain fixes for vulnerability CVE-2025-10035.
  • Ensure the GoAnywhere administration console is not publicly accessible on the internet by implementing proper network segmentation and VPN-based access when necessary.
  • Review administration audit logs (Admin Audit logs) for suspicious activity, especially the creation of administrative or unauthorized web user accounts.
  • Check log files for errors containing the string “SignedObject.getObject”, which may indicate exploitation attempts of the vulnerability, in the format:
    "ERROR Error parsing license response java.lang.RuntimeException: InvocationTargetException: java.lang.reflect.InvocationTargetException"
  • Implement detection rules in SIEM and EDR systems to identify attack patterns related to CVE-2025-10035, including malformed HTTP requests to the licensing endpoint.
  • Conduct a full compromise assessment on instances that were publicly exposed prior to patching, including user account reviews, log analysis, and investigation of compromise indicators.

SEK remains available to assist its clients with patch implementation, compromise assessment, and strengthening security posture.

 

More content like this:

SEK Identifies WhatsApp Scam Campaign with Fake Payment Receipt

SEK has identified a new cyberattack campaign targeting Brazilian companies through WhatsApp.

Extraordinary VN – VMware Aria Operations e VMware Tools

Broadcom disclosed CVE-2025-41244 (CVSS 7.8) in VMware Aria/Tools, a zero-day exploited by Chinese actors.

Privacy Overview
SEK

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

3rd Party Cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.

Additional Cookies

This website uses the following additional cookies:

(List the cookies that you are using on the website here.)