Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10932: CWE-400 Uncontrolled Resource Consumption in Progress MOVEit Transfer

0
High
VulnerabilityCVE-2025-10932cvecve-2025-10932cwe-400
Published: Wed Oct 29 2025 (10/29/2025, 14:12:33 UTC)
Source: CVE Database V5
Vendor/Project: Progress
Product: MOVEit Transfer

Description

Uncontrolled Resource Consumption vulnerability in Progress MOVEit Transfer (AS2 module).This issue affects MOVEit Transfer: from 2025.0.0 before 2025.0.3, from 2024.1.0 before 2024.1.7, from 2023.1.0 before 2023.1.16.

AI-Powered Analysis

AILast updated: 10/29/2025, 14:38:30 UTC

Technical Analysis

CVE-2025-10932 is an uncontrolled resource consumption vulnerability (CWE-400) identified in the AS2 module of Progress MOVEit Transfer, a widely used managed file transfer solution. The flaw affects multiple recent versions: 2023.1.0 before 2023.1.16, 2024.1.0 before 2024.1.7, and 2025.0.0 before 2025.0.3. The vulnerability allows an unauthenticated remote attacker to trigger excessive consumption of system resources, such as CPU, memory, or network bandwidth, by sending specially crafted requests to the AS2 module. This can lead to denial of service (DoS), degrading system availability and potentially impacting the integrity of file transfer operations. The CVSS v3.1 base score of 8.2 reflects the ease of exploitation (network vector, no privileges or user interaction required) and the high impact on availability and integrity, though confidentiality is not affected. No public exploits or active exploitation have been reported yet, but the vulnerability's characteristics make it a significant risk for organizations relying on MOVEit Transfer for secure file exchange. The lack of patch links in the provided data suggests that organizations should monitor vendor advisories closely for updates and apply patches promptly once available. The AS2 protocol is critical for secure EDI and file transfers in many industries, increasing the potential impact of this vulnerability.

Potential Impact

For European organizations, the impact of CVE-2025-10932 can be substantial, particularly for those in finance, healthcare, government, and logistics sectors that depend heavily on MOVEit Transfer for secure and reliable file exchange. Exploitation could lead to denial of service conditions, disrupting business operations, delaying critical data transfers, and potentially causing compliance issues with data handling regulations such as GDPR. The integrity impact, while lower than availability, could affect trust in file transfer processes if resource exhaustion leads to incomplete or corrupted transfers. Given the vulnerability requires no authentication or user interaction, attackers could launch attacks at scale, potentially targeting multiple organizations or supply chains simultaneously. This could also increase the risk of cascading failures in interconnected systems. The absence of known exploits in the wild currently provides a window for proactive defense, but the high CVSS score underscores the urgency of mitigation.

Mitigation Recommendations

European organizations should take the following specific steps to mitigate CVE-2025-10932: 1) Immediately inventory all MOVEit Transfer installations and identify affected versions. 2) Monitor Progress Software’s official channels for patch releases and apply updates to MOVEit Transfer versions 2023.1.16, 2024.1.7, or 2025.0.3 or later as soon as they become available. 3) Implement network-level protections such as rate limiting and anomaly detection on AS2 traffic to identify and block unusual request patterns that could indicate resource exhaustion attempts. 4) Configure system resource quotas and limits on servers hosting MOVEit Transfer to prevent a single process from consuming excessive CPU or memory. 5) Conduct regular performance and availability monitoring to detect early signs of resource consumption attacks. 6) Review and tighten firewall rules to restrict AS2 traffic to trusted partners and IP addresses. 7) Educate IT and security teams about the vulnerability and response procedures to ensure rapid incident handling. 8) Consider deploying web application firewalls (WAFs) with custom rules to mitigate malformed or suspicious AS2 requests. These targeted actions go beyond generic advice by focusing on the specific nature of the AS2 module and resource consumption vectors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
ProgressSoftware
Date Reserved
2025-09-24T17:13:32.630Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690226d083bae5e8565b1722

Added to database: 10/29/2025, 2:38:08 PM

Last enriched: 10/29/2025, 2:38:30 PM

Last updated: 10/30/2025, 3:24:06 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats