CVE-2025-10035

10.0 CRITICAL CISA KEV

📋 TL;DR

A critical deserialization vulnerability in Fortra's GoAnywhere MFT License Servlet allows attackers with forged license signatures to execute arbitrary commands through object deserialization. This affects all organizations using vulnerable versions of GoAnywhere MFT. The vulnerability enables remote code execution with the highest severity rating.

💻 Affected Systems

Products:
  • Fortra GoAnywhere MFT
Versions: All versions prior to 7.6.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: The License Servlet is a core component; all standard installations are vulnerable unless specifically hardened.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise leading to data theft, ransomware deployment, lateral movement across the network, and complete loss of confidentiality, integrity, and availability.

🟠

Likely Case

Remote code execution allowing attackers to install malware, exfiltrate sensitive data, or establish persistent backdoors on the MFT server.

🟢

If Mitigated

Limited impact if network segmentation, strict access controls, and monitoring prevent successful exploitation or contain the damage.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires a validly forged license response signature, but this has been confirmed in real attacks. CISA has added this to its Known Exploited Vulnerabilities catalog.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.6.1

Vendor Advisory: https://www.fortra.com/security/advisories/product-security/fi-2025-012

Restart Required: Yes

Instructions:

1. Download GoAnywhere MFT version 7.6.1 from Fortra's support portal. 2. Backup your current installation and configuration. 3. Stop the GoAnywhere MFT service. 4. Apply the update following Fortra's upgrade documentation. 5. Restart the service and verify functionality.

🔧 Temporary Workarounds

Network Segmentation and Access Control

all

Restrict network access to GoAnywhere MFT to only trusted IP addresses and internal networks.

Disable License Servlet if Unused

all

If license management features are not required, disable the License Servlet component.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate GoAnywhere MFT from critical systems and the internet.
  • Deploy application-level firewalls or WAF rules to block suspicious requests to the License Servlet endpoint.

🔍 How to Verify

Check if Vulnerable:

Check the GoAnywhere MFT version in the admin interface or via the installation directory. Versions below 7.6.1 are vulnerable.

Check Version:

Check the version in the web admin interface at /admin or review the release notes in the installation directory.

Verify Fix Applied:

After patching, confirm the version shows as 7.6.1 or higher in the admin interface and test license functionality remains operational.

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to /goanywhere/license or similar license servlet endpoints
  • Unexpected process execution or command injection patterns in system logs
  • Failed license validation attempts with suspicious signatures

Network Indicators:

  • Outbound connections from GoAnywhere MFT server to unknown external IPs
  • Unusual traffic patterns to/from the MFT server on non-standard ports

SIEM Query:

source="goanywhere" AND (url_path="/license" OR event_description="license servlet") AND status="200"

🔗 References

📤 Share & Export