The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive requiring all federal agencies to patch a critical vulnerability in Fortra's GoAnywhere MFT software. This vulnerability, tracked as CVE-2023-0669, allows remote code execution and has been actively exploited by a China-linked threat actor group known as APT41. The flaw poses a significant risk to federal networks and sensitive data, prompting swift action to mitigate potential breaches. Fortra, the company behind GoAnywhere, has released patches to address the issue, but the urgency remains high due to ongoing exploitation. This incident highlights the persistent threat posed by state-sponsored hackers targeting supply chain and managed file transfer solutions. Federal agencies are urged to prioritize patching and enhance monitoring to detect any signs of compromise. The directive underscores the importance of proactive cybersecurity measures and collaboration between government and private sector to defend against sophisticated cyber threats. This case serves as a critical reminder of the vulnerabilities in widely used enterprise software and the need for continuous vigilance and rapid response to emerging threats.
This Cyber News was published on therecord.media. Publication date: Tue, 30 Sep 2025 17:35:19 +0000