VulnerabilitiesHIGH

Progress ShareFile - Critical Flaws Enable Pre-Auth RCE Attacks

Featured image for Progress ShareFile - Critical Flaws Enable Pre-Auth RCE Attacks
BCBleepingComputer·Reporting by Bill Toulas
📰 5 sources·Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Updated:
🎯

Basically, hackers can exploit flaws in ShareFile to run malicious code without needing a password.

Quick Summary

New vulnerabilities in Progress ShareFile could allow hackers to execute code without authentication. Thousands of businesses are at risk. Immediate patching is essential to secure systems.

What Happened

Two serious vulnerabilities have been discovered in Progress ShareFile, a secure file transfer solution used by many businesses. These flaws can be exploited together to allow attackers to execute remote code without authentication. The vulnerabilities, identified as CVE-2026-2699 and CVE-2026-2701, were found in the Storage Zones Controller (SZC) component of ShareFile.

How the Attack Works

The attack begins with CVE-2026-2699, which allows unauthorized access to the ShareFile admin interface due to improper handling of HTTP redirects. Once attackers gain access, they can change critical settings, including file storage paths and security configurations.

Next, they exploit CVE-2026-2701 to achieve remote code execution. This is done by uploading malicious files to the server, which can then be executed to compromise the system further. The attackers need to generate valid HMAC signatures and decrypt internal secrets, but this is feasible after exploiting the first flaw.

Who's Affected

Research indicates that approximately 30,000 Storage Zone Controller instances are publicly accessible on the internet. The ShadowServer Foundation has reported around 700 of these instances exposed, primarily in the United States and Europe. Businesses using vulnerable versions of ShareFile are at significant risk of data breaches and unauthorized access.

What Data Was Exposed

If exploited, these vulnerabilities could lead to unauthorized access to sensitive files and data stored within ShareFile. Attackers could manipulate or exfiltrate confidential information, posing a severe threat to organizational security.

Patch Status

Progress Software has addressed these vulnerabilities in version 5.12.4, released on March 10. Users are strongly advised to update their systems immediately to mitigate any risks associated with these flaws.

Immediate Actions

Organizations using Progress ShareFile should take the following steps:

  • Update to the latest version (5.12.4) as soon as possible.
  • Audit configurations and access controls to ensure no unauthorized changes have been made.
  • Monitor for any unusual activity that may indicate exploitation attempts.

Though no active exploitation has been observed yet, the public disclosure of these vulnerabilities is likely to attract malicious actors. Immediate action is crucial to protect sensitive data and maintain system integrity.

🔒 Pro insight: The ability to chain these vulnerabilities highlights a dangerous trend in enterprise software security, necessitating rigorous patch management practices.

Original article from

BCBleepingComputer· Bill Toulas
Read Full Article

Also covered by

SCSC Media

Progress ShareFile vulnerabilities allow unauthenticated file exfiltration

Read Article
CYCybersecurity Dive

Researchers warn of critical flaws in Progress ShareFile

Read Article
SESecurityWeek

Critical ShareFile Flaws Lead to Unauthenticated RCE

Read Article
CACanadian Cyber Centre Alerts

Progress security advisory (AV26-310)

Read Article
CYCyber Security News

New Progress ShareFile Bugs Let Attackers Take Over Servers Without Logging In

Read Article

Related Pings

CRITICALVulnerabilities

Fortinet FortiClient EMS - Critical 0-Day Vulnerability Exploited

A critical zero-day vulnerability in FortiClient EMS is actively exploited. Fortinet has released emergency patches and urges immediate action from users.

Cyber Security News·
HIGHVulnerabilities

Video Conferencing Bug - CISA Orders Agencies to Patch

A serious vulnerability in TrueConf video conferencing software is being exploited by Chinese hackers. CISA has mandated a two-week patch deadline for federal agencies. Immediate action is essential to safeguard sensitive data and communications.

The Record·
HIGHVulnerabilities

Post-Deployment Vulnerability Detection - Rethinking Strategies

A new approach to vulnerability detection is needed post-deployment. Many organizations overlook risks from newly disclosed CVEs, leaving systems exposed. Rethinking strategies can enhance security.

OpenSSF Blog·
HIGHVulnerabilities

Mobile Vulnerabilities - Enterprises Struggle with Control

Mobile devices are increasingly vulnerable due to outdated software and hidden threats like Shadow AI. This puts sensitive enterprise data at risk. Organizations must act to secure their mobile environments.

SecurityWeek·
HIGHVulnerabilities

CVE-2026-33691 - OWASP CRS Whitespace Padding Bypass Alert

A new vulnerability in OWASP CRS allows attackers to upload dangerous files by exploiting whitespace in filenames. This affects many web applications, risking severe security breaches. Immediate updates are necessary to protect your systems.

Full Disclosure·
HIGHVulnerabilities

MetInfo CMS Vulnerability - PHP Code Injection Risk

A critical vulnerability in MetInfo CMS could let attackers execute arbitrary PHP code. Versions 7.9, 8.0, and 8.1 are at risk. Stay alert for updates and potential fixes.

Full Disclosure·