Overview
- watchTowr says exploitation began around September 10, eight days before Fortra’s September 18 advisory and fixes for the CVSS 10.0 flaw.
- Attackers reportedly achieved unauthenticated remote code execution, created a backdoor admin, then added a web user to upload and run further payloads.
- Rapid7 assesses the exploit involves a chain of three issues: a known access control bypass from 2023, the unsafe deserialization bug, and an unresolved question about access to the private key ‘serverkey1’.
- Fortra describes the issue as a deserialization weakness in the license servlet triggered via a forged license response signature, and it shared IoCs to aid detection.
- Patches are available in GoAnywhere MFT 7.8.4 and Sustain 7.6.3, with urgent guidance to remove public access to the Admin Console as over 20,000 instances appear exposed online.