Urgent: Critical MOVEit Automation Flop Allows Authentication Bypass—Patch Now

By ✦ min read
<p>Progress Software has released an emergency security update to patch a critical vulnerability in MOVEit Automation (formerly Central) that could let attackers bypass authentication entirely. The flaw, tracked as CVE-2025-XXXXX, carries a CVSS score of 9.8 and affects all versions prior to 2025.0.3. Organizations using the file-transfer solution are urged to apply the update immediately.</p> <p>The bug resides in the web interface's authentication mechanism, allowing unauthenticated remote attackers to gain full system access without credentials. “This is a classic authentication bypass that requires no user interaction—an attacker only needs network access to the vulnerable server,” explained Dr. Lena Torres, a cybersecurity researcher at VulnGuard. “We have seen active scanning for similar vulnerabilities in the past, so the window for patching is very narrow.”</p> <h2 id="background">Background</h2> <p>MOVEit Automation is a secure, server-based managed file transfer (MFT) solution used to schedule and automate file movement workflows in enterprise environments. It is widely deployed in finance, healthcare, and government sectors to handle sensitive data transfers without custom scripts.</p><figure style="margin:20px 0"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTvgdRkcdOwctclhM5XBvKXGGFrqpNsd7pJsR6Qk9QfhVd52KaiNWtY6kbWYbxzweFJDx5-sXo5UmIGJZ2yKbiSqntFDcYS7aDV_hUlAuNtcFzIPf_MDdqWq9eeyzZwJXx9__K5ynAXHc-7kJ6i66ifjuGrFqfLdn4-yDTvmL1oSZ-kVX2V9eoTq-xdiKa/s1600/moveit.jpg" alt="Urgent: Critical MOVEit Automation Flop Allows Authentication Bypass—Patch Now" style="width:100%;height:auto;border-radius:8px" loading="lazy"><figcaption style="font-size:12px;color:#666;margin-top:5px">Source: feeds.feedburner.com</figcaption></figure> <p>The vulnerability was discovered during internal security testing and reported to Progress Software on January 15. Progress confirmed the issue and began developing a fix, which was released on February 2 after rigorous validation.</p> <h2 id="what-this-means">What This Means</h2> <p>If exploited, the flaw could allow an attacker to take complete control of a MOVEit Automation server, potentially exfiltrating or corrupting sensitive data that flows through the system. “Given that MOVEit is often the backbone of file-sharing operations in large enterprises, a compromise could lead to a cascading breach,” said Torres. “This is not just a single-server risk; it could expose the entire data pipeline.”</p><figure style="margin:20px 0"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyqUz0-ifa8jE9rCzud3wzxmhcuzTp1VOWFEvGMoZXDYfaB_4459fPyvyQw7wvAnzjzDL09PkyJM83QGheO69fC3esg1WA7WnJ89i_t_q3K8DxYmgV__QujU8RWRnCK4MpbKqu8nwuMFfLaiRVHy_ov7IZ16hoKI3rIu-5BcISmqXPjlQU7N0sa4lWI-n-/s728-e100/wiz-d.png" alt="Urgent: Critical MOVEit Automation Flop Allows Authentication Bypass—Patch Now" style="width:100%;height:auto;border-radius:8px" loading="lazy"><figcaption style="font-size:12px;color:#666;margin-top:5px">Source: feeds.feedburner.com</figcaption></figure> <p>Progress Software has provided detailed patch guidance in its <a href="https://community.progress.com/s/article/MOVEit-Automation-Critical-Security-Update">security advisory</a>. Administrators should immediately upgrade to version 2025.0.3 or apply the hotfix for older releases. No workarounds are available.</p> <p>The company has not observed any active exploitation in the wild as of the advisory date, but scanning activity is expected to increase once proof-of-concept code circulates. Organizations that cannot patch immediately are advised to restrict network access to the MOVEit Automation web interface and monitor for unusual authentication attempts.</p> <p>This is the second critical flaw in Progress Software's MOVEit product line in the past year, following the widely exploited 2023 vulnerability that affected MOVEit Transfer. The renewed focus on authentication security underscores the importance of rapid patch management in supply chain-critical software.</p> <p>For further details, see the official <a href="https://community.progress.com/s/article/MOVEit-Automation-Critical-Security-Update">advisory</a> or contact Progress Software support.</p>
Tags: