Description
Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal.
Published: 2024-01-22
Score: 9.8 Critical
EPSS: 93.0% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Upgrade to version 7.4.1 or higher. The vulnerability may also be eliminated in non-container deployments by deleting the InitialAccountSetup.xhtml file in the install directory and restarting the services. For container-deployed instances, replace the file with an empty file and restart. For additional information, see  https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml  (registration required). https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml


Vendor Workaround

Users are encouraged to apply defense-in-depth tactics to limit access to the administrative console. Do not expose the console to the internet and apply web application controls such as a WAF, monitoring, and access controls.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 30 May 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Fortra Goanywhere Managed File Transfer
cve-icon MITRE

Status: PUBLISHED

Assigner: Fortra

Published:

Updated: 2025-05-30T14:22:31.288Z

Reserved: 2024-01-03T00:12:28.436Z

Link: CVE-2024-0204

cve-icon Vulnrichment

Updated: 2024-08-01T17:41:15.984Z

cve-icon NVD

Status : Modified

Published: 2024-01-22T18:15:20.137

Modified: 2024-11-21T08:46:03.627

Link: CVE-2024-0204

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses