<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cpe:2.3:a:progress:moveit_automation:*:*:*:*:*:*:*:* — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/cpes/cpe2.3aprogressmoveit_automation/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 21 May 2026 12:19:33 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/cpes/cpe2.3aprogressmoveit_automation/feed.xml" rel="self" type="application/rss+xml"/><item><title>Multiple Vulnerabilities in Progress MOVEit Automation</title><link>https://feed.craftedsignal.io/briefs/2026-05-moveit-automation-vulns/</link><pubDate>Thu, 21 May 2026 12:19:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-moveit-automation-vulns/</guid><description>Multiple vulnerabilities in Progress MOVEit Automation allow for remote denial of service, security policy bypass, and unspecified security issues.</description><content:encoded><![CDATA[<p>On May 21, 2026, CERT-FR published an advisory regarding multiple vulnerabilities in Progress MOVEit Automation. These vulnerabilities, identified by CVE-2026-8485, CVE-2026-8486, CVE-2026-8487, and CVE-2026-8488, can lead to remote denial-of-service (DoS), security policy bypass, and unspecified security compromises. The affected versions include MOVEit Automation versions 2025.1.x prior to 2025.1.7 and versions prior to 2025.0.11. Defenders should apply the patches released by Progress to mitigate these risks and ensure the confidentiality, integrity, and availability of MOVEit Automation instances.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable MOVEit Automation instance running a version prior to 2025.0.11 or 2025.1.7.</li>
<li>The attacker exploits CVE-2026-8485, CVE-2026-8486, CVE-2026-8487, or CVE-2026-8488 to gain unauthorized access.</li>
<li>Depending on the specific vulnerability exploited, the attacker bypasses security policies implemented within MOVEit Automation.</li>
<li>The attacker crafts malicious requests to trigger a denial-of-service condition, impacting the availability of MOVEit Automation services.</li>
<li>The attacker leverages the unspecified security vulnerability to perform unauthorized actions.</li>
<li>The attacker may attempt to escalate privileges within the MOVEit Automation system.</li>
<li>The attacker may attempt to access sensitive data stored or processed by MOVEit Automation.</li>
<li>The attacker disrupts or disables MOVEit Automation services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to significant disruption of file transfer operations, potential data breaches, and reputational damage. Organizations relying on MOVEit Automation for critical file transfers may experience service outages, compliance violations, and financial losses. The unspecified vulnerability could potentially allow for more severe impacts, such as data exfiltration or complete system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch MOVEit Automation instances to version 2025.1.7 or later to remediate CVE-2026-8485, CVE-2026-8486, CVE-2026-8487, and CVE-2026-8488 as referenced in the advisory.</li>
<li>Monitor web server logs for suspicious activity targeting MOVEit Automation endpoints to detect potential exploitation attempts.</li>
<li>Deploy the Sigma rule &ldquo;Detect MOVEit Automation Security Policy Bypass Attempt&rdquo; to identify potential security policy circumvention.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>vulnerability</category><category>dos</category><category>security-bypass</category></item></channel></rss>