Progress warns of critical MOVEit Automation auth bypass flaw
Progress says the flaws could allow unauthorized access and administrative control, and more than 1,400 internet-connected instances are exposed, researchers said.
10 Articles
10 Articles
Progress warns against the CVE-2026-4670 vulnerability in MOVEit Automation. Hackers can completely bypass authentication. Software developer Progress has released an urgent security warning for its file transfer solution MOVEit Automation. A critical vulnerability allows unauthorized actors to bypass the entire authentication of the system. Since MOVEit Automation is used worldwide by corporations and authorities for the automated exchange of s…
Progress Software has patched a critical failure in MOVEit Automation that allows for non-interactional authentication jump and opens the door to massive theft of business data. The vulnerability, registered as CVE-2026-4670, was discovered by Airbus SecLab and can be exploited through the backend service command port. I see it as the reissue of a nightmare that we already lived in 2023 with the Clop ransomware. The same family of file transfer …
Among other things, a critical vulnerability threatens the file transfer software MOVEit Automation.
Progress Patches Critical MOVEit Automation Bug Enabling Authentication Bypass
Progress Software has released updates to address two security flaws in MOVEit Automation, including a critical bug that could result in an authentication bypass. MOVEit Automation (formerly Central) is a secure, server-based managed file transfer (MFT) solution used to schedule and automate file movement workflows in enterprise environments without requiring any custom scripts. The This article has been indexed from The Hacker News Read the …
Coverage Details
Bias Distribution
- 100% of the sources are Center
Factuality
To view factuality data please Upgrade to Premium






