CVE-2024-0396

7.1 HIGH

📋 TL;DR

This CVE describes an input validation vulnerability in Progress MOVEit Transfer that allows authenticated users to manipulate HTTPS transaction parameters. Successful exploitation could cause computational errors leading to denial of service. Organizations running affected MOVEit Transfer versions are impacted.

💻 Affected Systems

Products:
  • Progress MOVEit Transfer
Versions: Versions before 2022.0.10 (14.0.10), 2022.1.11 (14.1.11), 2023.0.8 (15.0.8), 2023.1.3 (15.1.3)
Operating Systems: Windows Server (primary platform)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to exploit. All default configurations of affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of MOVEit Transfer, preventing file transfers and disrupting business operations until service is restored.

🟠

Likely Case

Temporary service degradation or crashes requiring manual intervention to restart services.

🟢

If Mitigated

Minimal impact with proper input validation and monitoring in place to detect and block malicious parameter manipulation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and specific parameter manipulation knowledge. No public exploit code identified at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2022.0.10 (14.0.10), 2022.1.11 (14.1.11), 2023.0.8 (15.0.8), or 2023.1.3 (15.1.3)

Vendor Advisory: https://community.progress.com/s/article/MOVEit-Transfer-Service-Pack-January-2024

Restart Required: Yes

Instructions:

1. Download the appropriate service pack from Progress support portal. 2. Backup MOVEit Transfer configuration and data. 3. Install the service pack following Progress documentation. 4. Restart MOVEit Transfer services. 5. Verify functionality.

🔧 Temporary Workarounds

Restrict User Access

all

Limit authenticated user access to only necessary personnel to reduce attack surface.

Enhanced Monitoring

all

Implement monitoring for unusual parameter manipulation attempts in HTTPS transactions.

🧯 If You Can't Patch

  • Implement strict access controls and principle of least privilege for all MOVEit Transfer users.
  • Deploy web application firewall (WAF) rules to detect and block parameter manipulation attempts.

🔍 How to Verify

Check if Vulnerable:

Check MOVEit Transfer version in administrative interface or via PowerShell: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*MOVEit*'} | Select Name, Version

Check Version:

In MOVEit Admin interface: Help > About, or PowerShell: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*MOVEit Transfer*'} | Select Version

Verify Fix Applied:

Verify installed version matches or exceeds patched versions: 2022.0.10, 2022.1.11, 2023.0.8, or 2023.1.3

📡 Detection & Monitoring

Log Indicators:

  • Unusual parameter values in HTTPS requests
  • Multiple failed transactions from single authenticated user
  • Service crash or restart events

Network Indicators:

  • Abnormal parameter manipulation patterns in HTTPS traffic to MOVEit Transfer

SIEM Query:

source="moveit_transfer.log" AND ("parameter manipulation" OR "unexpected value" OR "service crash")

🔗 References

📤 Share & Export