Skip to main content

CVE-2024-0204: CWE-425 Direct Request ('Forced Browsing') in Fortra GoAnywhere MFT

Critical
VulnerabilityCVE-2024-0204cvecve-2024-0204cwe-425
Published: Mon Jan 22 2024 (01/22/2024, 18:05:13 UTC)
Source: CVE Database V5
Vendor/Project: Fortra
Product: GoAnywhere MFT

Description

Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal.

AI-Powered Analysis

AILast updated: 07/08/2025, 16:41:16 UTC

Technical Analysis

CVE-2024-0204 is a critical authentication bypass vulnerability identified in Fortra's GoAnywhere Managed File Transfer (MFT) software versions prior to 7.4.1, specifically noted in version 6.0.1. The vulnerability is classified under CWE-425, which pertains to Direct Request or Forced Browsing attacks. This flaw allows an unauthenticated attacker to bypass normal authentication mechanisms and gain unauthorized access to the administration portal. Exploiting this vulnerability, an attacker can create a new administrative user account without any prior credentials or user interaction. Given the administrative privileges granted, the attacker can fully control the GoAnywhere MFT environment, potentially manipulating file transfers, accessing sensitive data, altering configurations, or deploying further malicious activities within the network. The CVSS v3.1 base score of 9.8 reflects the critical nature of this vulnerability, highlighting its network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits in the wild have been reported yet, the ease of exploitation and the severity of impact make this a significant threat to organizations using affected versions of GoAnywhere MFT. The absence of patch links suggests that remediation may require upgrading to version 7.4.1 or later, where the vulnerability is presumably fixed.

Potential Impact

For European organizations, the impact of CVE-2024-0204 can be severe. GoAnywhere MFT is widely used for secure file transfers, often handling sensitive personal data, financial information, and critical business documents. An attacker exploiting this vulnerability can gain administrative control over the MFT system, leading to unauthorized data access, data exfiltration, or disruption of file transfer operations. This can result in breaches of GDPR compliance due to unauthorized exposure of personal data, leading to regulatory fines and reputational damage. Additionally, the attacker could manipulate or delete files, impacting business continuity and operational integrity. Given the criticality of the vulnerability and the potential for complete system compromise without authentication or user interaction, European enterprises relying on GoAnywhere MFT for secure data exchange are at high risk of targeted attacks, especially in sectors like finance, healthcare, government, and critical infrastructure where secure file transfer is essential.

Mitigation Recommendations

European organizations should immediately assess their use of Fortra GoAnywhere MFT and identify any instances running versions prior to 7.4.1, particularly version 6.0.1. The primary mitigation is to upgrade to the latest patched version (7.4.1 or newer) as soon as possible. In the absence of an immediate upgrade path, organizations should restrict network access to the administration portal by implementing strict firewall rules, allowing access only from trusted IP addresses or internal networks. Multi-factor authentication (MFA) should be enforced on all administrative accounts to add an additional security layer. Monitoring and logging of administrative portal access should be enhanced to detect any unauthorized attempts or suspicious activities. Additionally, organizations should conduct thorough audits of existing administrative accounts to identify any unauthorized users created before patching. Network segmentation can limit the exposure of the MFT server to potential attackers. Finally, organizations should prepare incident response plans specific to this vulnerability to quickly contain and remediate any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Fortra
Date Reserved
2024-01-03T00:12:28.436Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839c41d182aa0cae2b4359e

Added to database: 5/30/2025, 2:43:41 PM

Last enriched: 7/8/2025, 4:41:16 PM

Last updated: 8/11/2025, 7:00:30 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats