CVE-2024-9945

5.3 MEDIUM

📋 TL;DR

An information disclosure vulnerability in Fortra's GoAnywhere MFT allows external attackers to access sensitive admin root folder resources without authentication. This affects organizations using GoAnywhere MFT versions before 7.7.0 for secure file transfers.

💻 Affected Systems

Products:
  • Fortra GoAnywhere MFT
Versions: All versions prior to 7.7.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the admin root folders specifically; standard user folders may not be affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive configuration files, credentials, or administrative data leading to complete system compromise and data exfiltration.

🟠

Likely Case

Unauthorized access to sensitive administrative files and configuration data, potentially exposing credentials and system information.

🟢

If Mitigated

Limited exposure if proper network segmentation and access controls are implemented, but still presents information disclosure risk.

🌐 Internet-Facing: HIGH - External access is explicitly mentioned in the vulnerability description, making internet-facing instances particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this to gain unauthorized access to admin resources.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows external access, suggesting relatively simple exploitation paths.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.7.0

Vendor Advisory: https://www.fortra.com/security/advisories/product-security/fi-2024-014

Restart Required: Yes

Instructions:

1. Download GoAnywhere MFT version 7.7.0 from Fortra support portal. 2. Backup current configuration and data. 3. Stop GoAnywhere services. 4. Install the update following vendor documentation. 5. Restart services and verify functionality.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to GoAnywhere MFT admin interfaces using firewall rules

Admin Folder Access Controls

all

Implement additional file system permissions on admin root folders

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to GoAnywhere MFT
  • Monitor admin folder access logs for suspicious activity and implement additional authentication layers

🔍 How to Verify

Check if Vulnerable:

Check GoAnywhere MFT version in admin interface or via system properties; versions below 7.7.0 are vulnerable.

Check Version:

Check version in GoAnywhere admin web interface or consult installation documentation for version verification methods.

Verify Fix Applied:

Verify version shows 7.7.0 or higher in admin interface and test that external access to admin folders is properly restricted.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to admin folders
  • Unusual file access patterns in admin directories

Network Indicators:

  • External IP addresses accessing admin endpoints
  • Unusual traffic patterns to admin interfaces

SIEM Query:

source="goanywhere" AND (event_type="file_access" AND path="*admin*") OR (http_request="*admin*")

🔗 References

📤 Share & Export