Progress Software has disclosed a new critical vulnerability in its MOVEit Automation software, tracked as CVE-2026-4670. The flaw is an authentication bypass that could allow a remote, unauthenticated attacker to gain unauthorized access to the system, potentially with administrative privileges. The vulnerability has been assigned a CVSS score of 9.8 (Critical). A second, less severe privilege escalation flaw, CVE-2026-5174, was also patched. Given the history of widespread, devastating attacks targeting the MOVEit ecosystem (notably the MOVEit Transfer campaign of 2023), any critical vulnerability in this product line is cause for immediate concern and action. Progress Software is strongly recommending that all customers apply the provided patches without delay.
CVE-2026-4670: This is the primary, critical vulnerability. It is an authentication bypass flaw. While specific technical details have not been publicly released to prevent further exploitation, an authentication bypass in a file transfer system typically allows an attacker to access the system's functions without providing valid credentials. This could lead to unauthorized access to sensitive files, modification of transfer tasks, or full administrative control of the MOVEit Automation server. The attack vector is likely via a specially crafted request to a web-facing component of the software, making it an instance of T1190 - Exploit Public-Facing Application.
CVE-2026-5174: This is a secondary vulnerability involving improper input validation, which could lead to privilege escalation. An attacker who already has low-level access to the system could potentially exploit this to gain higher privileges.
The vulnerabilities affect multiple versions of MOVEit Automation. Customers should check their specific version against the following list:
2024.0.02024.0.0 up to 2024.1.82025.0.0 up to 2025.0.9Progress Software has released patched versions (2024.1.8, 2025.0.9, and a new version for older editions) to address these vulnerabilities.
As of the disclosure, Progress Software has not stated that these vulnerabilities are being actively exploited in the wild. However, the history of the MOVEit brand makes it an extremely high-profile target for threat actors. Security researchers and attackers will be actively reverse-engineering the patch to develop a working exploit. The time to exploitation is likely to be very short.
The potential impact of CVE-2026-4670 is severe. MOVEit Automation is used by thousands of organizations worldwide to automate the transfer of critical and sensitive files, including financial data, PII, and intellectual property. An attacker who successfully exploits this vulnerability could:
The mass exploitation of the MOVEit Transfer vulnerability in 2023 by the Clop ransomware group affected over 2,700 organizations and 95 million individuals, demonstrating the catastrophic potential of a flaw in this ecosystem.
The following patterns may help identify vulnerable or compromised systems:
M1035 - Limit Access to Resource Over Network.The primary and most urgent mitigation is to apply the full installer update provided by Progress Software.
Restrict network access to the MOVEit Automation server's interfaces to only authorized and necessary systems.
Progress Software discloses CVE-2026-4670 and CVE-2026-5174 and releases patches.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.