VulnerabilitiesHIGH

Progress ShareFile Vulnerabilities - Unauthenticated Exfiltration Risk

Featured image for Progress ShareFile Vulnerabilities - Unauthenticated Exfiltration Risk
SCSC Media
CVE-2026-2699CVE-2026-2701Progress ShareFileunauthenticated accessremote code execution
🎯

Basically, flaws in Progress ShareFile let attackers steal files without needing a password.

Quick Summary

Two critical vulnerabilities in Progress ShareFile have been found, allowing unauthorized access to sensitive files. Organizations using this software are at risk of data breaches. Immediate patching is crucial to secure data and prevent exploitation.

What Happened

Recently, two critical vulnerabilities were discovered in Progress ShareFile, an enterprise file transfer solution. These flaws can be exploited together to allow unauthenticated file exfiltration, posing a serious risk to organizations using this software for secure data sharing.

The Flaw

Researchers from watchTowr identified an authentication bypass (CVE-2026-2699) and a remote code execution flaw (CVE-2026-2701) within the Storage Zones Controller (SZC) component of Progress ShareFile versions 5.x. The attack begins with the authentication bypass, which grants attackers access to the admin interface.

What's at Risk

Once inside, attackers can manipulate storage zone configurations, including file paths and sensitive security parameters. The second vulnerability allows for remote code execution by abusing file upload functionality to deploy malicious webshells. Although attackers must generate valid HMAC signatures and decrypt internal secrets, these steps become feasible after exploiting the initial authentication bypass.

Patch Status

Approximately 30,000 SZC instances are exposed publicly, with around 700 instances observed by ShadowServer Foundation. Progress has addressed these vulnerabilities in ShareFile version 5.12.4, released on March 10. While no active exploitation has been reported yet, the public disclosure of these vulnerabilities is likely to attract threat actors.

Immediate Actions

Organizations using vulnerable versions of ShareFile Storage Zone Controller are urged to patch immediately to prevent potential data breaches and ransomware attacks. Ignoring these vulnerabilities could lead to significant data loss and reputational damage.

In conclusion, the discovery of these vulnerabilities highlights the importance of regular updates and vigilance in cybersecurity practices. Organizations must prioritize patching to safeguard their data and systems against emerging threats.

🔒 Pro insight: The combination of these vulnerabilities creates a dangerous attack vector, necessitating immediate action from affected organizations to mitigate risks.

Original article from

SCSC Media
Read Full Article

Related Pings

HIGHVulnerabilities

Apple Patches DarkSword - Protects iOS 18 Users

Apple has patched a critical vulnerability in iOS 18, known as DarkSword. This update protects users from severe threats. Organizations can now enhance their mobile security.

Dark Reading·
CRITICALVulnerabilities

F5 BIG-IP APM Vulnerability - 14,000 Devices Exposed Online

A critical RCE vulnerability in F5's BIG-IP APM has exposed over 14,000 devices online. This flaw poses serious risks to enterprise networks. Immediate patching is essential to secure these systems from exploitation.

Cyber Security News·
HIGHVulnerabilities

Google Patches Fourth Chrome Zero-Day Vulnerability

Google has patched a serious zero-day vulnerability in Chrome, the fourth this year. Users are at risk of exploitation if they don't update their browsers. Immediate action is necessary to ensure safety.

CSO Online·
HIGHVulnerabilities

Claude Code Vulnerability - Exploit Risks Revealed

A serious vulnerability in Claude Code has been uncovered, allowing potential exploits through command sequences. Anthropic has a fix ready, but it's not yet in use. Users should exercise caution to protect sensitive data.

CSO Online·
HIGHVulnerabilities

Post-Deployment Vulnerability Detection - Rethinking Strategies

A new approach to vulnerability detection is needed post-deployment. Many organizations overlook risks from newly disclosed CVEs, leaving systems exposed. Rethinking strategies can enhance security.

OpenSSF Blog·
CRITICALVulnerabilities

Critical Flaws in Progress ShareFile - Researchers Warn

Researchers have found critical vulnerabilities in Progress ShareFile that could allow attackers to execute remote code. Organizations using this service are at risk and should take immediate action to secure their systems.

Cybersecurity Dive·