Skip to content

Microsoft Warns: Active Exploitation of Fortra's GoAnywhere MFT Vulnerability

Your business could be at risk. Microsoft urges immediate patching of Fortra's GoAnywhere MFT to prevent data breaches and ransomware attacks.

there was a room in which people are sitting in the chairs,in front of a table looking into the...
there was a room in which people are sitting in the chairs,in front of a table looking into the laptop and doing something,beside them there are many flee xi in which different advertisements are present which different text.

Microsoft Warns: Active Exploitation of Fortra's GoAnywhere MFT Vulnerability

Microsoft has warned of active exploitation of a critical vulnerability in Fortra's GoAnywhere MFT since mid-September 2025. The cybercrime group Storm-1175, linked to Medusa ransomware, has been leveraging this flaw for nearly a month.

WatchTowr Labs confirmed that the vulnerability, identified as CVE-2025-10035, is a deserialization issue in the License Servlet of GoAnywhere MFT. It allows command injection via a validly forged license response signature, enabling attackers to gain access remotely without user interaction.

Microsoft observed threat actors exploiting this zero-day vulnerability to gain access, maintain persistence using remote management tools (RMM), and exfiltrate data with Rclone. Fortra addressed the issue on September 18, 2025, releasing a patch to mitigate the risk.

Microsoft advises updating GoAnywhere MFT to the latest patched version, using tools like Defender EASM for detection and prevention, and restricting servers from making arbitrary outbound internet connections. Users are urged to apply the patch promptly to protect against potential data breaches and ransomware attacks.

Read also:

Latest