CVE-2025-10932

8.2 HIGH

📋 TL;DR

This vulnerability allows attackers to cause denial of service through uncontrolled resource consumption in Progress MOVEit Transfer's AS2 module. It affects all MOVEit Transfer installations running vulnerable versions, potentially disrupting file transfer operations. Organizations using MOVEit Transfer for secure file transfers are impacted.

💻 Affected Systems

Products:
  • Progress MOVEit Transfer
Versions: 2025.0.0 to 2025.0.2, 2024.1.0 to 2024.1.6, 2023.1.0 to 2023.1.15
Operating Systems: Windows Server, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with AS2 module enabled. All default configurations with AS2 are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage of MOVEit Transfer, disrupting all file transfer operations and potentially affecting business continuity for organizations relying on this system.

🟠

Likely Case

Degraded performance or temporary unavailability of the AS2 module, interrupting secure file transfers until service is restored.

🟢

If Mitigated

Minimal impact with proper rate limiting, resource monitoring, and network segmentation in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Resource consumption vulnerabilities typically require minimal technical skill to exploit once details are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.0.3, 2024.1.7, 2023.1.16

Vendor Advisory: https://community.progress.com/s/article/MOVEit-Transfer-Vulnerability-CVE-2025-10932-October-29-2025

Restart Required: Yes

Instructions:

1. Download appropriate patch version from Progress support portal. 2. Backup current installation. 3. Run installer with administrative privileges. 4. Restart MOVEit Transfer services. 5. Verify successful update.

🔧 Temporary Workarounds

Disable AS2 Module

all

Temporarily disable the AS2 module if not required for operations

Navigate to MOVEit Admin > Modules > Disable AS2

Implement Rate Limiting

all

Configure network-level rate limiting for AS2 connections

Configure firewall/load balancer to limit connections per IP to AS2 port

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate MOVEit Transfer from untrusted networks
  • Deploy Web Application Firewall (WAF) with rate limiting rules for AS2 traffic

🔍 How to Verify

Check if Vulnerable:

Check MOVEit Transfer version in Admin interface: Admin > System > About

Check Version:

Not applicable - use web interface at /admin

Verify Fix Applied:

Verify version shows 2025.0.3, 2024.1.7, or 2023.1.16 or higher in Admin interface

📡 Detection & Monitoring

Log Indicators:

  • Unusual spike in AS2 connection attempts
  • Resource exhaustion warnings in system logs
  • High CPU/memory usage alerts

Network Indicators:

  • Abnormal volume of traffic to AS2 port (typically 80/443)
  • Multiple connection attempts from single IPs

SIEM Query:

source="moveit.log" AND ("AS2" OR "resource" OR "denial") AND severity>=WARNING

🔗 References

📤 Share & Export