CVE-2024-5805

9.1 CRITICAL

📋 TL;DR

CVE-2024-5805 is an authentication bypass vulnerability in Progress MOVEit Gateway's SFTP modules that allows attackers to gain unauthorized access without valid credentials. This affects organizations using MOVEit Gateway 2024.0.0 for secure file transfers. The vulnerability enables attackers to bypass authentication mechanisms and potentially access sensitive data.

💻 Affected Systems

Products:
  • Progress MOVEit Gateway
Versions: 2024.0.0
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the SFTP modules of MOVEit Gateway. Other MOVEit products and versions are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to MOVEit Gateway, exfiltrate all stored sensitive files, deploy ransomware, and pivot to internal networks.

🟠

Likely Case

Unauthorized access to SFTP file repositories leading to data theft, modification, or deletion of sensitive business files.

🟢

If Mitigated

Limited impact with proper network segmentation, strong access controls, and monitoring detecting authentication anomalies.

🌐 Internet-Facing: HIGH - MOVEit Gateway is typically exposed to the internet for file transfers, making it directly accessible to attackers.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this, but external exposure presents greater risk.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass vulnerabilities typically have low exploitation complexity. Given the critical nature and high CVSS score, weaponization is likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.0.1 or later

Vendor Advisory: https://community.progress.com/s/article/MOVEit-Gateway-Critical-Security-Alert-Bulletin-June-2024-CVE-2024-5805

Restart Required: Yes

Instructions:

1. Download the latest MOVEit Gateway patch from Progress Customer Support. 2. Backup current configuration and data. 3. Apply the patch following Progress installation instructions. 4. Restart MOVEit Gateway services. 5. Verify successful update and functionality.

🔧 Temporary Workarounds

Disable SFTP Module

all

Temporarily disable vulnerable SFTP modules while maintaining other transfer protocols

# Navigate to MOVEit Gateway admin interface
# Go to Configuration > Protocols
# Disable SFTP protocol

Network Access Restriction

windows

Restrict access to MOVEit Gateway to trusted IP addresses only

# Windows Firewall example:
New-NetFirewallRule -DisplayName "MOVEit Gateway Restrict" -Direction Inbound -LocalPort 22 -Protocol TCP -RemoteAddress 192.168.1.0/24 -Action Allow

🧯 If You Can't Patch

  • Isolate MOVEit Gateway in a dedicated network segment with strict firewall rules limiting inbound connections
  • Implement multi-factor authentication at network perimeter and monitor for authentication anomalies

🔍 How to Verify

Check if Vulnerable:

Check MOVEit Gateway version in admin interface under Help > About. If version is exactly 2024.0.0, the system is vulnerable.

Check Version:

# In MOVEit Gateway admin interface: Help > About displays version

Verify Fix Applied:

Verify version shows 2024.0.1 or later in admin interface and test SFTP authentication with invalid credentials to ensure proper rejection.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful access
  • SFTP connections from unexpected IP addresses
  • Multiple authentication attempts with variations

Network Indicators:

  • SFTP traffic patterns showing successful transfers after failed auth
  • Unusual file access patterns or large data transfers

SIEM Query:

source="moveit_gateway.log" ("authentication failed" AND "session established") OR ("SFTP" AND "unauthorized access")

🔗 References

📤 Share & Export