CVE-2023-0669 — Fortra GoAnywhere MFT Remote Code Execution Vulnerability
Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2.
Published
2023-02-06T19:16:19.265Z
Last modified
2025-10-21T23:15:27.683Z
CISA KEV — Actively Exploited
01What is this vulnerability?
Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2.
02Affected products
| Vendor | Product | Versions |
|---|
| Fortra | Goanywhere MFT | 0 |
03Active exploitation status
Yes — actively exploited. Added to the CISA KEV catalog on 2023-02-10. Ransomware use: Known.
04Recommended remediation
- Patch to a fixed version listed in the vendor advisory (see references below).
- Mitigate with WAF rules, network egress filters, or feature flags where the patch is not yet available.
- Hunt historical logs for exploitation indicators — see Detection signatures below.
05Technical details
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
06Detection signatures
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
Open in Sigma generator →
07Related CVEs
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.
08Timeline
- Published: 2023-02-06T19:16:19.265Z
- Last modified: 2025-10-21T23:15:27.683Z
- Added to CISA KEV: 2023-02-10
- BOD 22-01 due: 2023-03-03
09References
- my.goanywhere.com — https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml#zerodayfeb1
- infosec.exchange — https://infosec.exchange/@briankrebs/109795710941843934
- www.rapid7.com — https://www.rapid7.com/blog/post/2023/02/03/exploitation-of-goanywhere-mft-zero-…
- attackerkb.com — https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis
- github.com — https://github.com/rapid7/metasploit-framework/pull/17607
- duo.com — https://duo.com/decipher/fortra-patches-actively-exploited-zero-day-in-goanywher…
- frycos.github.io — https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html
- packetstormsecurity.com — http://packetstormsecurity.com/files/171789/Goanywhere-Encryption-Helper-7.1.1-R…
Want this in your SOAR or SIEM?
SARA's API returns EPSS, CVSS, KEV, and an analyst-grade summary in one call.
Read the API reference →