MOVEit Disaster: 3rd Vulnerability - Run 3rd Patch!

MOVEit Disaster: 3rd Vulnerability - Run 3rd Patch!

Share post

Manufacturer Progress Software has just released the 2nd update for MOVEit Transfer and MOVEit Transfer Cloud, so the company is now quickly adding a patch for a 3rd vulnerability. Just one day earlier, it was said that no further vulnerabilities were expected. Again it is a SQL injection vulnerability - a patch is essential!

The message is just now 2nd vulnerability here on B2B-Cyber-Security.de appeared, there is a message about the third vulnerability. Companies using MOVEit Transfer must patch the vulnerability. The appropriate patch is already available. Many users and administrators may already be confused as to which patch versions are the right ones. Progress Software provides guidance on which versions require which patch accordingly.

Admins can hardly keep up with patching

Progress Software said it worked with external cybersecurity experts to further review the existing code. The second vulnerability was found on June 09th, 2023. Since this is not closed by the first patch, companies urgently need to install the second patch - for MOVEit Transfer and MOVEit Cloud. The 2rd patch now probably refers to MOVEit Transfer again. The following gaps must be closed:

Patch 1: CVE-2023-34362 (May 31, 2023)
Patch 2: CVE-2023-35036 (June 9, 2023)
Patch 3: CVE-2023-35708 (June 15, 2023)

CLOP APT Group publishes first company names

Progress Software presents all dependencies and the history of the vulnerabilities online. Since the code is still being tested, it is possible that further patches will follow. Meanwhile, the CLOP APT group keeps updating their leaks page. There are more and more names of companies that are said to be affected. Only the companies can confirm whether this is really the case.

🔎 According to the CLOP Group, the listed companies lost data through the MOVEit Transfer vulnerability, but were unwilling to pay ransom. Whether this is true is unconfirmed. The companies themselves have not yet published any statements (Image: B2B-CS).

🔎 According to the CLOP Group, the listed companies lost data through the MOVEit Transfer vulnerability, but were unwilling to pay ransom. Whether this is true is unconfirmed. The companies themselves have not yet published any statements (Image: B2B-CS).

At the same time, the group announced that they had received many e-mails from the authorities because data had also been leaked there. CLOP would immediately delete this data as it is "solely financially motivated and doesn't care about politics". Meanwhile, cybersecurity companies like Tenable have reported that CLOP had also skimmed US government data.

More at Progress.com

 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more