
At a later date, we will be disclosing the proof of concept and steps taken to reproduce the vulnerability.

This blog post will go into some detail about how to get an environment set up to reverse engineer this issue.

Your browser does not support the video tag. You can watch our RCE proof of concept video below: When critical vulnerabilities are exploited in the wild, our team works diligently in reverse engineering the exploit payloads and providing assurance to our customers on whether or not they are truly vulnerable via our Attack Surface Management platform. This exploit chain has been reproduced by our security research team and checks have been available and running on all customers. There have been several great blog posts covering the incident response, forensic artifacts, and detection engineering efforts when it comes to preventing compromise.Īssetnote was successful at determining the full exploit chain for this vulnerability, including the SQL injection and the remote code execution attack vector.

In the last few days, threat actors have been exploiting a critical pre-authentication vulnerability within Progress MOVEIt Transfer.
