• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

MOVEit Transfer Exploit Attempt - CVE-2023-34362

Risk Factors

This vulnerability is well known and easy to exploit. Many organizations, from universities to enterprises, have been affected. Advanced persistent threat (APT) groups have exploited this vulnerability to launch additional attacks on networks.

Kill Chain

Exploitation

Risk Score

87

Detection diagram
Next in Exploitation: Microsoft Exchange Exploit Attempt - CVE-2021-42321

Attack Background

Organizations can securely transfer files between businesses with managed file transfer (MFT) solutions. The Progress Software MFT solution, MOVEit Transfer, includes an SQL injection vulnerability in the MOVEit web application. To exploit the vulnerability, an attacker sends HTTP requests with malicious SQL statements in HTTP headers. The SQL injection attack can be chained together with other vulnerabilities to ultimately perform remote code execution (RCE). For example, initial SQL injection attempts are designed to allow remote access to a restricted REST API and create an attacker-controlled privileged user. With this access, the attacker can upload a malicious payload and run the malicious payload on the victim device.

Mitigation Options

Apply relevant patches to affected software versions

MITRE ATT&CK ID

What else can RevealX do for you?