Executive Summary

    On June 25th, software company Progress publicly disclosed a critical severity vulnerability in their managed file transfer software application, MOVEit Transfer. The vulnerability is being tracked as CVE-2024-5806 and allows a remote attacker to bypass authentication and log in as any valid user on the system. This access could enable the attacker to download files accessible to any user on the MOVEit appliance. Since these appliances are typically used to securely transfer sensitive information, bypassing authentication mechanisms could result in the unauthorized download of a large amount of sensitive data stored on the MOVEit appliance.

    Progress discovered this vulnerability internally prior to the disclosure and began distribution the patch on June 11th. At the time, they started privately communicating with and assisting affected users. The June 25th advisory was the first public disclosure. A third party security firm, Watchtowr, also published a detailed technical writeup of the advisory and Proof of Concept (PoC) exploit code on their blog. The vulnerability is complicated and can potentially be exploited a variety of ways. The Watchtowr writeup provides enough detail that Beazley Security expects financially motivated threat actors to develop and deploy weaponized exploits for this vulnerability over the coming few days. Researchers have already begun seeing attempted scans to identify vulnerable MOVEit instances. It should also be noted that the last time a critical vulnerability was found in MOVEit, the cl0p threat actor group exploited it in a widespread and highly damaging ransomware campaign.

    Given these factors, Beazley Security is strongly recommending that organizations with internet exposed MOVEit transfer appliances apply Progress’ provided software patches as soon as possible.

    Affected Systems or Products

    The vulnerability affects the following Progress products:

    • MOVEit Transfer from 2023.0.0 to before 2023.0.11

    • MOVEit Transfer from 2023.1.0 to before 2023.1.6

    • MOVEit Transfer from 2024.0.0 to before 2024.0.2

    Progress provides instructions to verify MOVEit versions for clients here.

    Mitigations / Workarounds

    Beazley Security is not aware of any temporary mitigations or workarounds to address this vulnerability. The vendor provided software patch is the only solution.

    Beazley Security will monitor Client’s endpoints through its MDR services utilizing some or all of the assets outlined below. This description outlines the Scope of Work's primary nature and is not an exhaustive list of support and service(s).

    Patches

    Progress has provided patch instructions in their advisory here. MOVEit cloud clients do not need to take any action, as their patches have already been applied. MOVEit Transfer clients on a current maintenance agreement have been instructed to access the upgrade by logging into the Progress Community.

    Indicators of Compromise

    A threat actor attacking this vulnerability will have to eventually attempt an SFTP login, so threat hunts and detection strategies should center around that.

    If an attacker attempts the username enumeration method detailed above, threat hunts should look for:

    • Large amounts of brute force style SFTP attempts

    • Suspicious outbound network connections from MOVEit processes during SFTP authentication

    If an attacker attempts to use the “Key Upload” attack scenario, threat hunts should look for:

    • Suspicious file uploads

    • Suspicious file access by MOVEit processes during SFTP authentication

    If an attacker attempts to use the “Key Injection” attack scenario, threat hunts should look for:

    • Remote use of the guestaccess.aspx API

    • POST requests to that API containing encryption keys

    • guestaccess.aspx logs containing encryption keys

    • Suspicious file access of log files by MOVEit processes during SFTP authentication

    Technical Details

    The most comprehensive description of the vulnerability and how exploitation works can be found in the Watchtowr writeup. The software bug is essentially that an underlying system that handles authentication keys will, in a specific case, treat raw key data as a file path. This is a critical error, because:

    1. 1.

      Treating data as a file path can lead to un-intended side effects, and

    2. 2.

      This key data can be sent remotely by an attacker without authenticating

    This has resulted in a vulnerability that Watchtowr researchers reported can be exploited in three ways described below.

    Attack Scenario: Forced Authentication

    The first attack scenario involves tricking the MOVEit server into connecting to an attacker-controlled machine to access a key. The attacker could then extract and crack an NTLM password hash from the connection.

    This scenario requires the targeted MOVEit server to be able to connect to remote hosts over the Internet via SMB. While that type of traffic is often not allowed, it should not be assumed to be blocked. If this attack is successful, it will give an attacker access to the MOVEit service account.

    The attack would look as follows:

    Forced Authentication Attack Scenario

    Figure 1 : Forced Authentication Attack Scenario

    Attack Scenario: Key Upload

    The second attack scenario is more interesting. It is somewhat limited in that an attacker would need to:

    1. 1.

      know an existing username, and

    2. 2.

      be able to upload a key to the target MOVEit server

    If an attacker can satisfy these conditions, they can login with the known username, but without having to use a password or legitimate key.

    The attack would look as follows:

    Key Upload Attack Scenario

    Figure 2 : Key Upload Attack Scenario

    Attack Scenario: Key Injection

    The third attack scenario is the most interesting and potentially dangerous. Watchtowr researchers discovered that for the following MOVEit Transfer API endpoint:

    https://<target>/guestaccess.aspx/

    This API will log HTTP POST requests in a way that an attacker can inject a key they control onto the server without having to use legitimate file upload processes. The attacker would still have to know an existing username but could login without knowing the password or having legitimate keys.

    The attack would look as follows:

    Key Injection Attack Scenario

    Figure 3 : Key Injection Attack Scenario

    Attack Scenario: Username Enumeration

    Both above attack scenarios require a threat actor to know an existing username on the victim MOVEit server, and Watchtowr detailed a method they developed to enumerate usernames on a target machine.

    This cleverly uses the first attack scenario of passing an arbitrary network UNC path as a key to check if a guessed username is legitimate. If the attacker sets up a remote server to listen for these key requests, then starts testing usernames against the target MOVEit server, the MOVEit server will connect to the attacker-controlled server if a given username exists.

    The enumeration attack would look as follows:

    User Enumeration Method

    Figure 4 : User Enumeration Method

    How Beazley Security is responding

    Beazley Security is monitoring client perimeter devices discovered by our Attack Surface Management Solution, Karma, to identify potentially impacted devices and support organizations in remediation of any issues found.