25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Hackers Start Attempting Exploitation of Critical MOVEit Transfer Vulnerability

Progress Software has recently disclosed two flaws in its MOVEit Transfer managed file transfer solution, and one flaw in MOVEit Gateway. The first attempts at exploitation were detected within a day of the public disclosures. All three of the flaws are authentication bypass issues and successful exploitation would allow unauthorized individuals to gain access to sensitive data.

The MOVEIt Transfer flaws affect the following MOVEit versions:

  • 2023.0.0 before 2023.0.11
  • 2023.1.0 before 2023.1.6
  • 2024.0.0 before 2024.0.2

The most serious MOVEit Transfer vulnerability is a critical flaw tracked as CVE-2024-5805 which has a CVSS score of 9.1. The second flaw is tracked as CVE-2024-5806 and is rated high-severity with a CVSS score of 7.4. The second vulnerability is in a third-party component of MOVEit Transfer and a patch for that vulnerability has not yet been released.

Progress Software said it notified customers about the flaws on June 11, 2024, and patched the CVE-2024-5805 vulnerability in versions 2023.0.11, 2023.1.6, and 2024.0.2, which are available for download on the Progress Community portal. The vulnerability has already been patched in MOVEit Cloud, so no action is required to mitigate the flaw. The MOVEit Gateway flaw affects version 2024.0.0 and has a CVSS score of 9.1. The vulnerability has been fixed in version 2024.0.1.

Get The FREE
HIPAA Compliance Checklist

Immediate Delivery of Checklist Link To Your Email Address

Please Enter Correct Email Address

Your Privacy Respected

HIPAA Journal Privacy Policy

The security company watchTowr was notified about the CVE-2024-5805 vulnerability and conducted its own investigation. After Progress Software lifted the embargo on the vulnerability on June 25, 2024, the researchers published technical details about the CVE-2024-5805 flaw, including how it can be exploited along with proof-of-concept (PoC) exploit code. PoC exploits have also been released by other security researchers.

Hackers have started trying to attack vulnerable endpoints so immediate patching is required if customers have not yet updated the latest version. Since a patch for the third-party flaw has yet to be released by the vendor, action is required to prevent exploitation. Progress Software recommends blocking Remote Desktop Protocol (RDP) access to MOVEit Transfer servers and restricting outbound connections to known and trusted endpoints.

While the vulnerabilities do not appear to be as serious as the 2023 vulnerability in MOVEit Transfer that was exploited by the Clop group on more than 2,700 publicly exposed MOVEIt Transfer servers, updating to the patched version and applying the recommended mitigations should not be delayed. According to Jared Semrau, senior manager of vulnerability and exploitation at Mandiant Intelligence, it would be trivial for an attacker to exploit the CVE-2024-5805 vulnerability if they had an address for a vulnerable MOVEit instance and a valid username.

On June 27, 2024, The Health Sector Cybersecurity Coordination Center issued a sector alert about the vulnerabilities, which can be viewed here.

Author: Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist