Fortra GoAnywhere MFT Attack

Released: Oct 07, 2025


Critical Severity

Fortra Vendor


File Transfer vulnerability under active exploitation

A critical deserialization vulnerability in GoAnywhere MFT’s License Servlet (CVSS 10.0) is actively being exploited in the wild. The flaw allows attackers with a forged license response signature to deserialize arbitrary objects, which can lead to command injection and remote code execution (RCE). FortiGuard telemetry shows sustained, high-volume exploitation attempts against GoAnywhere MFT instances. Learn More »

Common Vulnerabilities and Exposures


Background

GoAnywhere MFT instances are deployed to facilitate file transfers across networks, sometimes exposed to external or semi-trusted networks. Exposure to untrusted networks means threat actors have a better opportunity to probe and exploit. After initial RCE, the attacker can pivot: install malware, drop backdoors, harvest credentials, move laterally, or exfiltrate data.

Storm-1175 (tracked by Microsoft Threat Intelligence) is actively exploiting this vulnerability. The group is associated with Medusa ransomware operations and is known for targeting public-facing applications for initial access.

Latest Development

Recent news and incidents related to cybersecurity threats encompassing various events such as data breaches, cyber-attacks, security incidents, and vulnerabilities discovered.


FortiGuard customers are protected by multiple layers of defense against the exploit. However, immediate patching of affected system is strongly advised. Organizations with unpatched GoAnywhere MFT deployments are at very high risk of compromise, including ransomware delivery and data theft.

FortiGuard Cybersecurity Framework

Mitigate security threats and vulnerabilities by leveraging the range of FortiGuard Services.


PROTECT
  • Vulnerability

  • IPS

DETECT
  • IOC

  • Outbreak Detection

  • Threat Hunting

RESPOND
  • Automated Response

  • Assisted Response Services

RECOVER
  • NOC/SOC Training

  • End-User Training

IDENTIFY
  • Vulnerability Management

  • Attack Surface Monitoring (Inside & Outside)

  • Attack Surface Hardening

Threat Intelligence

Information gathered from analyzing ongoing cybersecurity events including threat actors, their tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), malware and related vulnerabilities.