• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Fortra Completes Postmortem Of GoAnywhere Vulnerability

    June 5, 2023 Alex Woodie

    Security firm Fortra recently published an analysis of the zero-day vulnerability that impacted its GoAnywhere MFT customers earlier this year and committed itself to “continuous improvement.” Meanwhile, an analysis shows that dozens of organizations continue to run unpatched and exposed versions of GoAnywhere months after the flaw was discovered and patches became available.

    Fortra (formerly HelpSystems) first became aware of the remote code injection exploit vulnerability in its GoAnywhere managed file transfer (MFT) product on January 30, as we previously reported, and quietly alerted customers on February 1. The company says it immediately shut down the hosted version of GoAnywhere that it offered to customers as a service, and shared mitigation information with its customers.

    The world became aware of the flaw on February 2, when security researcher Brian Krebs wrote about it on a security blog. On February 6, the security research firm Rapid7 posted its analysis of the vulnerability, which was assigned CVE-2023-0669 in the NIST’s National Vulnerability Database on the same day.

    “Based on the mitigations published by Fortra, we confirmed that this is a pre-authentication deserialization issue,” Rapid7 wrote on February 6. “To exploit the vulnerability, you either need network-level access to GoAnywhere MFT’s administration port (by default, port 8000), but this can also be exploited via an internal user’s browser…” NIST gave the vulnerability a base score of 7.2, which is considered a high severity. Rapid7 gave it an “attacker value” of “very high.”

    Fortra patched the flaw with the release of GoAnywhere MFT 7.1.2 the following day, on February 7. However, by then the security vulnerability in the Java-based product was being actively exploited by cybercriminals to steal data. The security publication Bleeping Computer wrote on February 10 that a ransomware gang named Clop told it that it had stolen data from more than 130 organizations. While the gang could have deployed ransomware, it decided only to steal files that victims had stored on GoAnywhere MFT servers, the publication wrote.

    Several high-profile customer names were reported to have fallen victim to the hack, including Proctor & Gamble, Hitachi Energy, Saks Fifth Avenue, Virgin, Rubrik, Crown Resorts, and the governments of Toronto and Tasmania. Community Health Systems (CHS) stated in an SEC filing that private health data for about 1 million individuals was compromised in an attack due to the GoAnywhere flaw.

    Fortra was initially reluctant to communicate publicly about the security vulnerability and didn’t respond to IT Jungle’s questions. However, it quickly changed course and issued a statement regarding its actions in response to the security vulnerability.

    On April 17, it summarized the findings of an independent security review in a blog post. According to the review, which was conducted by Unit42, a security division of Palo Alto Networks, the cybercriminals used the flaw to create unauthorized user accounts in some hosted GoAnywhere MFT customer environments, which they used to download files from January 28 to January 30.

    The attackers also used the vulnerability to install two tools, dubbed “Netcat” and “Errors.jsp,” in some hosted customer’s environments between January 28 and January 31, Fortra said. The company helped customers search for these tools, which were not in every customer’s environment, and take mitigation issues. No more unauthorized access was detected in customer’s hosted environments after these steps were taken, Fortra said, and the company has provisioned clean instances of GoAnywhere in the cloud and helped customers implement mitigation measures.

    But the hack wasn’t limited to Fortra’s cloud offering. The company said the flaw was used “against a small number of on-premise implementations running a specific configuration of the GoAnywhere MFT solution,” Fortra said in its report. The on-prem hacks started as far back as January 18, it said.

    The main culprit in the hack – besides the flaw in GoAnywhere itself – turned out to be the practice of some customers of “running an admin portal exposed to the internet,” Fortra said. The company said it “urgently notified all on-premise customers that a patch was available and shared additional mitigation guidance.”

    No other Fortra products were found to be compromised, the company said. Meanwhile, Fortra, which changed its name from HelpSystems last year to reflect its metamorphosis into a security-focused software firm, committed itself to doing better in the future.

    “As we move forward from this event, we will continuously review our operating practices and security program to ensure we emerge stronger as an organization,” the company said. “We are committed to continuous improvement as an organization on our current practices in areas such as:

    * Secure development and supply chain
    * Solution operations, support, and architecture
    * Customer communications and best practice documentation.”

    For customers running GoAnywhere on-prem, Fortra recommended “not allowing admin portal access from the internet.” It also published the GoAnywhere MFT Hardening Guide and urged customers to check out the GoAnywhere Compliance Center.

    Fortra recommended that GoAnywhere customers check whether they are storing credentials for other systems in the GoAnywhere environment “and make sure those credentials have been revoked.” It also provided some best-practice recommendations for secure computing, including rotating master encryption key; resetting keys and passwords for all external trading partners and systems; and reviewing audit logs and deleting any suspicious admin or Web user accounts.

    Source: Censys

    Unfortunately, it doesn’t appear that all GoAnywhere customers have heeded those warnings. An analysis by the security threat hunting firm Censys revealed that there are still many unpatched GoAnywhere instances exposed on the Internet.

    “Over 2 months after this zero day was disclosed, Censys continues to observe almost 180 hosts running exposed GoAnywhere MFT admin panels, with 30 percent of these (55 hosts) showing indications of remaining unpatched and potentially vulnerable to this exploit,” the company wrote on May 1.

    There was little to no improvement by the end of May. In fact, the number of exposed GoAnywhere hosts appears to have gone up after May 29, while the number of exposed and unpatched hosts remained the same from late April.

    RELATED STORIES

    Fortra Issues 20th State of IBM i Security Report

    Zero-Day Vulnerability in Fortra’s GoAnywhere MFT Being Actively Exploited

    How HelpSystems Became Fortra

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: Fortra, GoAnywhere, GoAnywhere MFT, IBM i

    Sponsored by
    Midrange Dynamics North America

    Git up to speed with MDChange!

    Git can be lightning-fast when dealing with just a few hundred items in a repository. But when dealing with tens of thousands of items, transaction wait times can take minutes.

    MDChange offers an elegant solution that enables you to work efficiently any size Git repository while making your Git experience seamless and highly responsive.

    Learn more.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Guru: Binding Directory Entries Power10 Boosts NVM-Express Flash Performance

    Leave a Reply Cancel reply

TFH Volume: 33 Issue: 33

This Issue Sponsored By

  • Maxava
  • New Generation Software
  • PERFSCAN
  • Computer Keyes
  • Manta Technologies

Table of Contents

  • Power10 Boosts NVM-Express Flash Performance
  • Fortra Completes Postmortem Of GoAnywhere Vulnerability
  • Guru: Binding Directory Entries
  • How Does Your Infrastructure Spending Stack Up To The World?
  • IBM i PTF Guide, Volume 25, Number 22

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Public Preview For Watson Code Assistant for i Available Soon
  • COMMON Youth Movement Continues at POWERUp 2025
  • IBM Preserves Memory Investments Across Power10 And Power11
  • Eradani Uses AI For New EDI And API Service
  • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D
  • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
  • Fresche Overhauls X-Analysis With Web UI, AI Smarts
  • Is It Time To Add The Rust Programming Language To IBM i?
  • Is IBM Going To Raise Prices On Power10 Expert Care?
  • IBM i PTF Guide, Volume 27, Number 20

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle