The vulnerability, tracked as CVE-2025-10035, is a command injection flaw that allows for unauthenticated remote code execution. Security firm watchTowr reported credible evidence of in-the-wild exploitation dating back to September 10, 2025, eight days before Fortra’s public advisory on September 18.
Fortra initially described the vulnerability as a deserialization issue in the GoAnywhere MFT License Servlet. According to the vendor’s advisory, an attacker with a “validly forged license response signature” could deserialize a crafted object, leading to command injection.
However, Fortra’s initial announcement on September 18 made no mention of active exploitation, despite including Indicators of Compromise (IoCs), a move that researchers found unusual. The company stated the issue was found during an internal security check on September 11.
Security researchers have provided a more detailed picture of the flaw and its exploitation timeline.
Research from Rapid7 indicates that CVE-2025-10035 is not a single bug but a chain of three separate issues: an access control bypass known since 2023, the new unsafe deserialization flaw, and an unknown issue that allows attackers to know a specific private key needed for the exploit.
Threat actors exploited the pre-authentication deserialization vulnerability to achieve Remote Code Execution (RCE).
With this access, they created a backdoor administrator account named admin-go and then used it to create a “legitimate” web user account to access the MFT service. Through this web user, the attackers uploaded and executed multiple secondary payloads.
According to watchTowr Labs, the exploitation started on September 10, predating the patch release on September 15 and the public advisory on September 18, confirming its status as a zero-day vulnerability.
The disclosure has drawn criticism, as Fortra is a signatory of the Secure By Design pledge, which commits to transparency about in-the-wild exploitation. By not initially disclosing the active attacks, security teams were left to assess risk without a full understanding of the threat timeline.
Evidence of the in-the-wild attacks includes several key indicators:
admin-go was created on compromised systems.C:Windowszato_be.exe and C:Windowsjwunst.exe (a SimpleHelp binary) were observed.155.2.190.197 was linked to the threat actor.whoami /groups was run, with its output saved to C:Windowstest.txt.Fortra has released GoAnywhere MFT version 7.8.4 and Sustain version 7.6.3 to address the vulnerability.
Given the history of GoAnywhere MFT being targeted by ransomware groups, organizations are urged to patch immediately and ensure their admin consoles are not exposed to the public internet.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post Fortra GoAnywhere Vulnerability Exploited as 0-Day Before Patch appeared first on Cyber Security News.
Tyler Peterson and his son Heron had tried baseball, soccer, kayaking and all sorts of…
Culture Shock in Rockford hosted its 19th annual Record Store Day event Saturday, featuring new…
Warning! Spoilers for Invincible on Prime Video follow.Fans of Prime Video’s Invincible have started debating…
The community of Lena has launched a widespread recovery and debris cleanup effort following significant…
Lena Brewing Company in Lena, located on Highway 20, is currently operating on a generator…
Marvel Studios mastermind Kevin Feige has opened up about the decision to bring Robert Downey…
This website uses cookies.