CVE-2025-10932: CWE-400 Uncontrolled Resource Consumption in Progress MOVEit Transfer
Uncontrolled Resource Consumption vulnerability in Progress MOVEit Transfer (AS2 module).This issue affects MOVEit Transfer: from 2025.0.0 before 2025.0.3, from 2024.1.0 before 2024.1.7, from 2023.1.0 before 2023.1.16.
AI Analysis
Technical Summary
CVE-2025-10932 is an uncontrolled resource consumption vulnerability (CWE-400) identified in the AS2 module of Progress MOVEit Transfer, a widely used managed file transfer solution. The flaw affects multiple recent versions: 2023.1.0 before 2023.1.16, 2024.1.0 before 2024.1.7, and 2025.0.0 before 2025.0.3. The vulnerability allows an unauthenticated remote attacker to trigger excessive consumption of system resources, such as CPU, memory, or network bandwidth, by sending specially crafted requests to the AS2 module. This can lead to denial of service (DoS), degrading system availability and potentially impacting the integrity of file transfer operations. The CVSS v3.1 base score of 8.2 reflects the ease of exploitation (network vector, no privileges or user interaction required) and the high impact on availability and integrity, though confidentiality is not affected. No public exploits or active exploitation have been reported yet, but the vulnerability's characteristics make it a significant risk for organizations relying on MOVEit Transfer for secure file exchange. The lack of patch links in the provided data suggests that organizations should monitor vendor advisories closely for updates and apply patches promptly once available. The AS2 protocol is critical for secure EDI and file transfers in many industries, increasing the potential impact of this vulnerability.
Potential Impact
For European organizations, the impact of CVE-2025-10932 can be substantial, particularly for those in finance, healthcare, government, and logistics sectors that depend heavily on MOVEit Transfer for secure and reliable file exchange. Exploitation could lead to denial of service conditions, disrupting business operations, delaying critical data transfers, and potentially causing compliance issues with data handling regulations such as GDPR. The integrity impact, while lower than availability, could affect trust in file transfer processes if resource exhaustion leads to incomplete or corrupted transfers. Given the vulnerability requires no authentication or user interaction, attackers could launch attacks at scale, potentially targeting multiple organizations or supply chains simultaneously. This could also increase the risk of cascading failures in interconnected systems. The absence of known exploits in the wild currently provides a window for proactive defense, but the high CVSS score underscores the urgency of mitigation.
Mitigation Recommendations
European organizations should take the following specific steps to mitigate CVE-2025-10932: 1) Immediately inventory all MOVEit Transfer installations and identify affected versions. 2) Monitor Progress Software’s official channels for patch releases and apply updates to MOVEit Transfer versions 2023.1.16, 2024.1.7, or 2025.0.3 or later as soon as they become available. 3) Implement network-level protections such as rate limiting and anomaly detection on AS2 traffic to identify and block unusual request patterns that could indicate resource exhaustion attempts. 4) Configure system resource quotas and limits on servers hosting MOVEit Transfer to prevent a single process from consuming excessive CPU or memory. 5) Conduct regular performance and availability monitoring to detect early signs of resource consumption attacks. 6) Review and tighten firewall rules to restrict AS2 traffic to trusted partners and IP addresses. 7) Educate IT and security teams about the vulnerability and response procedures to ensure rapid incident handling. 8) Consider deploying web application firewalls (WAFs) with custom rules to mitigate malformed or suspicious AS2 requests. These targeted actions go beyond generic advice by focusing on the specific nature of the AS2 module and resource consumption vectors.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2025-10932: CWE-400 Uncontrolled Resource Consumption in Progress MOVEit Transfer
Description
Uncontrolled Resource Consumption vulnerability in Progress MOVEit Transfer (AS2 module).This issue affects MOVEit Transfer: from 2025.0.0 before 2025.0.3, from 2024.1.0 before 2024.1.7, from 2023.1.0 before 2023.1.16.
AI-Powered Analysis
Technical Analysis
CVE-2025-10932 is an uncontrolled resource consumption vulnerability (CWE-400) identified in the AS2 module of Progress MOVEit Transfer, a widely used managed file transfer solution. The flaw affects multiple recent versions: 2023.1.0 before 2023.1.16, 2024.1.0 before 2024.1.7, and 2025.0.0 before 2025.0.3. The vulnerability allows an unauthenticated remote attacker to trigger excessive consumption of system resources, such as CPU, memory, or network bandwidth, by sending specially crafted requests to the AS2 module. This can lead to denial of service (DoS), degrading system availability and potentially impacting the integrity of file transfer operations. The CVSS v3.1 base score of 8.2 reflects the ease of exploitation (network vector, no privileges or user interaction required) and the high impact on availability and integrity, though confidentiality is not affected. No public exploits or active exploitation have been reported yet, but the vulnerability's characteristics make it a significant risk for organizations relying on MOVEit Transfer for secure file exchange. The lack of patch links in the provided data suggests that organizations should monitor vendor advisories closely for updates and apply patches promptly once available. The AS2 protocol is critical for secure EDI and file transfers in many industries, increasing the potential impact of this vulnerability.
Potential Impact
For European organizations, the impact of CVE-2025-10932 can be substantial, particularly for those in finance, healthcare, government, and logistics sectors that depend heavily on MOVEit Transfer for secure and reliable file exchange. Exploitation could lead to denial of service conditions, disrupting business operations, delaying critical data transfers, and potentially causing compliance issues with data handling regulations such as GDPR. The integrity impact, while lower than availability, could affect trust in file transfer processes if resource exhaustion leads to incomplete or corrupted transfers. Given the vulnerability requires no authentication or user interaction, attackers could launch attacks at scale, potentially targeting multiple organizations or supply chains simultaneously. This could also increase the risk of cascading failures in interconnected systems. The absence of known exploits in the wild currently provides a window for proactive defense, but the high CVSS score underscores the urgency of mitigation.
Mitigation Recommendations
European organizations should take the following specific steps to mitigate CVE-2025-10932: 1) Immediately inventory all MOVEit Transfer installations and identify affected versions. 2) Monitor Progress Software’s official channels for patch releases and apply updates to MOVEit Transfer versions 2023.1.16, 2024.1.7, or 2025.0.3 or later as soon as they become available. 3) Implement network-level protections such as rate limiting and anomaly detection on AS2 traffic to identify and block unusual request patterns that could indicate resource exhaustion attempts. 4) Configure system resource quotas and limits on servers hosting MOVEit Transfer to prevent a single process from consuming excessive CPU or memory. 5) Conduct regular performance and availability monitoring to detect early signs of resource consumption attacks. 6) Review and tighten firewall rules to restrict AS2 traffic to trusted partners and IP addresses. 7) Educate IT and security teams about the vulnerability and response procedures to ensure rapid incident handling. 8) Consider deploying web application firewalls (WAFs) with custom rules to mitigate malformed or suspicious AS2 requests. These targeted actions go beyond generic advice by focusing on the specific nature of the AS2 module and resource consumption vectors.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ProgressSoftware
- Date Reserved
- 2025-09-24T17:13:32.630Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690226d083bae5e8565b1722
Added to database: 10/29/2025, 2:38:08 PM
Last enriched: 10/29/2025, 2:38:30 PM
Last updated: 10/30/2025, 3:24:06 PM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.