Progress Software Discloses Critical Authentication Bypass Vulnerability (CVE-2026-4670) in MOVEit Automation

MOVEit Automation Hit with Critical 9.8 CVSS Auth Bypass Flaw (CVE-2026-4670)

CRITICAL
May 1, 2026
4m read
VulnerabilityPatch Management

Related Entities

Organizations

Progress Software National Vulnerability Database (NVD)

Products & Tech

MOVEit Automation

CVE Identifiers

CVE-2026-4670
CRITICAL
CVSS:9.8

Full Report

Executive Summary

Progress Software has disclosed a new critical vulnerability in its MOVEit Automation software, tracked as CVE-2026-4670. The flaw is an authentication bypass that could allow a remote, unauthenticated attacker to gain unauthorized access to the system, potentially with administrative privileges. The vulnerability has been assigned a CVSS score of 9.8 (Critical). A second, less severe privilege escalation flaw, CVE-2026-5174, was also patched. Given the history of widespread, devastating attacks targeting the MOVEit ecosystem (notably the MOVEit Transfer campaign of 2023), any critical vulnerability in this product line is cause for immediate concern and action. Progress Software is strongly recommending that all customers apply the provided patches without delay.

Vulnerability Details

  • CVE-2026-4670: This is the primary, critical vulnerability. It is an authentication bypass flaw. While specific technical details have not been publicly released to prevent further exploitation, an authentication bypass in a file transfer system typically allows an attacker to access the system's functions without providing valid credentials. This could lead to unauthorized access to sensitive files, modification of transfer tasks, or full administrative control of the MOVEit Automation server. The attack vector is likely via a specially crafted request to a web-facing component of the software, making it an instance of T1190 - Exploit Public-Facing Application.

  • CVE-2026-5174: This is a secondary vulnerability involving improper input validation, which could lead to privilege escalation. An attacker who already has low-level access to the system could potentially exploit this to gain higher privileges.

Affected Systems

The vulnerabilities affect multiple versions of MOVEit Automation. Customers should check their specific version against the following list:

  • All versions prior to 2024.0.0
  • Versions 2024.0.0 up to 2024.1.8
  • Versions 2025.0.0 up to 2025.0.9

Progress Software has released patched versions (2024.1.8, 2025.0.9, and a new version for older editions) to address these vulnerabilities.

Exploitation Status

As of the disclosure, Progress Software has not stated that these vulnerabilities are being actively exploited in the wild. However, the history of the MOVEit brand makes it an extremely high-profile target for threat actors. Security researchers and attackers will be actively reverse-engineering the patch to develop a working exploit. The time to exploitation is likely to be very short.

Impact Assessment

The potential impact of CVE-2026-4670 is severe. MOVEit Automation is used by thousands of organizations worldwide to automate the transfer of critical and sensitive files, including financial data, PII, and intellectual property. An attacker who successfully exploits this vulnerability could:

  • Steal, modify, or delete sensitive data in transit or at rest.
  • Disrupt critical business processes that rely on automated file transfers.
  • Gain a foothold within the network to launch further attacks.
  • Achieve full administrative control over the MOVE-it server.

The mass exploitation of the MOVEit Transfer vulnerability in 2023 by the Clop ransomware group affected over 2,700 organizations and 95 million individuals, demonstrating the catastrophic potential of a flaw in this ecosystem.

Cyber Observables — Hunting Hints

The following patterns may help identify vulnerable or compromised systems:

  • Vulnerable Versions: Use asset inventory systems to identify all instances of MOVEit Automation running a vulnerable version.
  • Web Logs: Monitor web server logs for the MOVEit Automation instance for any unusual or malformed requests, especially to authentication endpoints. Look for requests that result in a successful login without the expected preceding steps.
  • Application Logs: Review MOVEit Automation application logs for unauthorized access, unexpected changes to transfer tasks, or new administrative accounts.

Detection Methods

  • Vulnerability Scanning: Run authenticated and unauthenticated vulnerability scans against MOVEit Automation servers to identify the presence of the flaw.
  • Network Monitoring: Monitor network traffic to and from the MOVEit Automation server for connections to suspicious IP addresses, which could indicate C2 communication from an implant.
  • File Integrity Monitoring (FIM): Monitor critical MOVEit Automation system files and directories for unauthorized changes.

Remediation Steps

  1. Patch Immediately: This is the most critical step. All customers must upgrade to a patched version of MOVEit Automation as soon as possible. Progress has stated that the full installer must be used; simply applying a patch file is not sufficient.
  2. Plan for Downtime: The upgrade process will require a system outage. Organizations must plan for this downtime to apply the patch.
  3. Restrict Access: As a compensating control and a matter of best practice, restrict network access to the MOVEit Automation server. Ensure that only trusted systems and users can connect to its management interfaces. This aligns with MITRE Mitigation M1035 - Limit Access to Resource Over Network.
  4. Review Logs: After patching, review system and application logs for any signs of compromise that may have occurred before the patch was applied.

Timeline of Events

1
April 30, 2026
Progress Software discloses CVE-2026-4670 and CVE-2026-5174 and releases patches.
2
May 1, 2026
This article was published

MITRE ATT&CK Mitigations

The primary and most urgent mitigation is to apply the full installer update provided by Progress Software.

Restrict network access to the MOVEit Automation server's interfaces to only authorized and necessary systems.

Audit

M1047enterprise

After patching, conduct a thorough review of all system and application logs to hunt for any signs of pre-patch compromise.

Timeline of Events

1
April 30, 2026

Progress Software discloses CVE-2026-4670 and CVE-2026-5174 and releases patches.

Sources & References

CVE-2026-4670 Detail
NIST NVD (nvd.nist.gov) April 30, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

MOVEitMOVEit AutomationCVE-2026-4670CVE-2026-5174VulnerabilityAuthentication BypassProgress SoftwarePatch Management

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.