Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-0669: CWE-502 Deserialization of Untrusted Data in Fortra Goanywhere MFT

0
High
VulnerabilityCVE-2023-0669cvecve-2023-0669cwe-502
Published: Mon Feb 06 2023 (02/06/2023, 19:16:19 UTC)
Source: CVE Database V5
Vendor/Project: Fortra
Product: Goanywhere MFT

Description

Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2.

AI-Powered Analysis

AILast updated: 10/28/2025, 22:10:27 UTC

Technical Analysis

CVE-2023-0669 is a vulnerability classified under CWE-502 (Deserialization of Untrusted Data) affecting Fortra's GoAnywhere Managed File Transfer (MFT) product. The flaw resides in the License Response Servlet component, which improperly deserializes data from an attacker-controlled source without sufficient validation or sanitization. This deserialization process allows an unauthenticated remote attacker to inject and execute arbitrary commands on the underlying system, effectively leading to command injection. The vulnerability is exploitable over the network without any user interaction, and no prior authentication is required, making it highly accessible to attackers. The issue was addressed by Fortra in version 7.1.2 of GoAnywhere MFT. The CVSS v3.1 score of 7.2 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no user interaction. While no public exploits have been reported, the nature of the vulnerability suggests that exploitation could lead to full system compromise, data theft, or disruption of file transfer services. The vulnerability highlights the risks inherent in insecure deserialization, a common vector for remote code execution in enterprise applications that process serialized objects from untrusted sources.

Potential Impact

For European organizations, the exploitation of CVE-2023-0669 could have severe consequences. Managed File Transfer solutions like GoAnywhere MFT are often used to handle sensitive data exchanges, including financial transactions, personal data transfers, and critical business communications. A successful attack could lead to unauthorized access to confidential data, modification or deletion of files, disruption of business operations, and potential lateral movement within corporate networks. This could result in regulatory non-compliance, especially under GDPR, financial losses, reputational damage, and operational downtime. Critical sectors such as finance, healthcare, government, and manufacturing that rely on secure file transfers are particularly vulnerable. The pre-authentication nature of the vulnerability increases the risk of widespread exploitation, especially in environments where the MFT server is exposed to the internet or untrusted networks.

Mitigation Recommendations

European organizations should immediately verify their GoAnywhere MFT version and upgrade to version 7.1.2 or later, where the vulnerability is patched. In addition to patching, organizations should implement network segmentation to restrict access to the MFT server, limiting exposure to untrusted networks. Employ strict firewall rules and access controls to minimize attack surface. Enable and monitor detailed logging on the MFT server to detect unusual deserialization attempts or command execution patterns. Conduct regular security audits and vulnerability scans focusing on deserialization risks. Where possible, apply application-layer protections such as Web Application Firewalls (WAFs) configured to detect and block suspicious serialized payloads. Educate IT and security teams about the risks of insecure deserialization and ensure secure coding practices are followed in custom integrations. Finally, maintain an incident response plan to quickly address any suspected exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
rapid7
Date Reserved
2023-02-03T22:09:23.898Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9a4247d717aace21699

Added to database: 10/21/2025, 7:06:12 PM

Last enriched: 10/28/2025, 10:10:27 PM

Last updated: 10/30/2025, 3:51:48 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats