MOVEit Automation: Critical Flaws, Familiar MFT Risks

Another MOVEit Vulnerability. Same Pattern. Different Stakes.

On April 30, 2026, Progress Software disclosed two vulnerabilities in MOVEit Automation, the workflow and scheduling engine that thousands of organizations use to automate enterprise file transfers. The National Vulnerability Database entries went live the same day. The vendor advisory landed in the Progress Customer Community. Security teams running MOVEit Automation are now in an emergency-patching cycle.

Key Takeaways

  1. Two Critical Bugs, One Familiar Product Family. Progress Software disclosed CVE-2026-4670 (CVSS 9.8) and CVE-2026-5174 (CVSS 8.8 NIST/7.7 CNA) in MOVEit Automation on April 30, 2026. Chained, they move an attacker from no access to administrative control.
  2. There Is No Workaround. Remediation requires upgrading to MOVEit Automation 2025.1.5, 2025.0.9, or 2024.1.8 using the full installer. The system must come down during the upgrade.
  3. No Confirmed Exploitation — Yet. Progress reports no in-the-wild exploitation as of disclosure. The 2023 MOVEit Transfer campaign started four days before public disclosure. Patch windows have not gotten longer.
  4. This Is the Pattern, Not the Exception. Cleo, CrushFTP, Wing FTP, and now MOVEit Automation. Managed file transfer software has become a structural target because it sits at the perimeter and holds the highest-value data.
  5. The Architectural Question Is the Real One. Every additional MFT vulnerability is a separate fire drill. Consolidation onto a single hardened, single-tenant data exchange platform changes the math.

The headline MOVEit vulnerability is CVE-2026-4670, an authentication bypass in MOVEit Automation that NIST scores at CVSS 9.8 — the maximum severity tier for a remote vulnerability. The second, CVE-2026-5174, is an improper input validation flaw that NIST scores at CVSS 8.8 High and that Progress (as the CNA) scores at CVSS 7.7. Both live in the service backend command port interfaces. Used together, they create a path from unauthenticated network access to administrative control of the MOVEit Automation environment. Progress states the obvious implication directly: “Exploitation may lead to unauthorized access, administrative control, and data exposure.”

The discovery credit goes to researchers Anaïs Gantet, Delphine Gourdou, Quentin Liddell, and Matteo Ricordeau of Airbus SecLab, per The Hacker News. As of disclosure, no in-the-wild exploitation has been confirmed. No public proof-of-concept has surfaced. That is the good news. The bad news is what history says about how long that condition typically holds for a critical, pre-authentication MFT vulnerability.

Why MOVEit Automation Is a Productive Target

MOVEit Automation — formerly branded MOVEit Central, and before that Ipswitch MOVEit Central — is not a niche product. It is the scheduler and workflow engine that organizations use to move payroll, financial transactions, partner files, healthcare records, and engineering data on automated cycles. The platform routinely stores or accesses credentials embedded in automation tasks, because that is how the automation actually works.

That profile is exactly why managed file transfer has become a structural target for ransomware groups and initial access brokers. The Dragos 2026 OT/ICS Cybersecurity Year in Review documented the pattern across multiple MFT platforms in 2024 and 2025. Cleo MFT (CVE-2024-50623, CVE-2024-55956) was exploited by Cl0p starting in late 2024, with more than 300 claimed victims across transportation, manufacturing, and food. CrushFTP faced two campaigns in 2025 — CVE-2025-31161 in March and CVE-2025-54309 in July. Wing FTP fell to CVE-2025-47812 via Lua injection enabling SYSTEM-level RCE. Dragos’s conclusion was direct: File transfer platforms have become a persistent target for ransomware groups and initial access brokers seeking financial gain through extortion or resale of access.

The 2026 MOVEit disclosures slot into that pattern. They do not require it. Adversary economics drive it. MFT sits at the perimeter, holds high-value data, is widely deployed, and is operated by IT teams that may or may not patch at emergency speed. From an attacker’s perspective, that is a structurally attractive target. From a buyer’s perspective, that is information that should shape architectural decisions.

What 2023 Actually Showed

In May 2023, Progress disclosed CVE-2023-34362, a SQL injection vulnerability in MOVEit Transfer — a different product in the MOVEit family than MOVEit Automation, and a different class of vulnerability than the 2026 disclosures. Within days, the Cl0pransomware group, tracked by CISA as TA505, was exploiting it at scale through the LEMURLOOT web shell. CISA added the CVE to its Known Exploited Vulnerabilities catalog on June 2, 2023. By the time the campaign settled, more than 2,700 organizations had been affected and tens of millions of individuals had been impacted. The class action consolidations in federal court followed.

The right way to use that history is not as a forecast of what will happen with CVE-2026-4670. The two products are different. The two vulnerabilities are different. As of disclosure, there is no evidence the 2026 flaws are being exploited. The wrong way to use that history is to treat it as irrelevant to risk assessment. What 2023 established was a base rate: Critical pre-authentication MFT vulnerabilities have a short shelf life before someone weaponizes them. The Cl0p campaign began on May 27, 2023 — four days before Progress’s public advisory landed. Defenders who responded after the public advisory were already four days behind the attackers.

That is the calculation security teams running MOVEit Automation are making right now. Patch with the full installer, accept the planned outage, and hope the historical pattern does not repeat. The longer-term question, for everyone running MFT regardless of vendor, is whether the architectural choice that put a standalone command port on the perimeter still makes sense.

What the Numbers Say About MFT Security Today

The defensible answer to that architectural question requires data. Kiteworks Data Security and Compliance Risk: 2025 MFT Survey Report found that 59% of organizations suffered MFT-related security incidents in the past year despite claiming mature security programs. The reasons sit in the architecture, not the threat sophistication. 63% have not integrated MFT with SIEM or SOC, creating significant blind spots in threat detection. 62% operate fragmented systems across MFT, email, file sharing, and web forms. Each fragmentation point is a separate policy, a separate audit log, and a separate emergency patching posture.

Automation maturity tracks even more cleanly with incident outcomes. The 2025 MFT Survey Report found that organizations with under 50% MFT automation reported a 71% incident rate. The 13% of organizations with 90 to 100% MFT automation — the ones treating it as a strategic control rather than a manual process — reported just 29%. The gap is not coincidence. End-to-end automation forces consolidation onto controls that survive an emergency disclosure. Manual processes generate the gaps that critical CVEs exploit.

The supply chain frame from Black Kite’s 2026 Third-Party Breach Report is even sharper. 136 verified third-party breach events in 2025. 719 publicly named victim companies. An estimated 26,000 additional affected companies never named. Median public disclosure lag of 73 days. When an MFT platform like MOVEit gets exploited at scale, most downstream organizations will not learn they were affected for over two months on average. The control buyers can exercise is upstream: Choose data exchange infrastructure with the smallest possible attack surface and the strongest possible audit defensibility.

What the Threat Landscape Looks Like in 2026

The 2026 MOVEit vulnerability does not arrive in a calm threat environment. The CrowdStrike 2026 Global Threat Report documents an 89% year-over-year increase in AI-enabled adversary activity, an average eCrime breakout time of 29 minutes from initial access to lateral movement, and 82% of detections now classified as malware-free. The combined signal is that attackers are moving faster, using identity and configuration weaknesses rather than signatures, and accelerating reconnaissance and social engineering with AI assistance.

The data posture is not catching up. The 2026 Thales Data Threat Report found that only 33% of organizations have complete knowledge of where their data is stored. If two-thirds of organizations cannot locate their sensitive data, they cannot bound the exposure when the platform moving that data is compromised. The WEF Global Cybersecurity Outlook 2026 tells the same story from the boardroom angle: Supply chain disruption is now the second-ranked cyber concern for CISOs and continues to climb the CEO concern list. AI vulnerabilities have entered the top five for CEOs of highly resilient organizations.

Stack these signals against the 2026 MOVEit disclosure and the implication for security teams is plain. Patch cycles are getting shorter, attacker tempo is getting faster, data visibility is not improving, and the structural risk concentration in MFT software has not moved. A patch fixes a vulnerability. Patches do not fix architectural exposure.

The Kiteworks Architectural Alternative

Kiteworks is not exploiting the MOVEit vulnerability disclosure. It is offering an architectural alternative that buyers should evaluate on its merits. The proposition is structural: Consolidate managed file transfer, secure email, file sharing, SFTP, web forms, and AI data integrations onto a single hardened virtual appliance with one policy engine, one consolidated audit log, and one set of security controls. The architecture changes the math three ways.

First, the platform is hardened at the appliance level rather than at the customer’s infrastructure layer. Embedded network firewall, web application firewall, and intrusion detection are maintained by Kiteworks. Customer-side security configuration is not the dependency it is with MFT products running on customer-managed infrastructure. The defense-in-depth model is demonstrable: When Log4Shell carried an industry CVSS of 10, the impact within the Kiteworks architecture was reduced to a CVSS of 4 because the layered controls contained the exposure. That is not a claim about Kiteworks being immune to vulnerabilities. No platform is. It is a claim about how the architecture limits exposure when a vulnerability does emerge.

Second, every Kiteworks deployment is single-tenant. Databases, file systems, and runtime environments are not shared across customers. The cross-tenant attack patterns that affect multi-tenant cloud services cannot reach across boundaries that do not exist. For regulated data exchange — financial transactions, healthcare records, defense data, partner credentials — single-tenant isolation is a structural control, not a configuration option.

Third, consolidation replaces point solutions. MFT is one channel. Real enterprises also exchange sensitive data through email, web forms, file sharing, SFTP, APIs, and increasingly through AI assistants and agents. When each of those channels runs on a different vendor stack with a different patch cycle, every disclosure becomes a separate fire drill. Unifying them under one platform with one audit log shrinks both attack surface and operational toil. That is the architectural answer to the recurring MFT CVE cycle.

What to Do This Week, This Quarter, and This Year

Action items, not aspiration. First, if you run MOVEit Automation, patch now. Upgrade to 2025.1.5, 2025.0.9, or 2024.1.8 using the full installer per the Progress advisory. There is no workaround and there is no shortcut. Plan the downtime, communicate it to dependent business units, and complete the upgrade on the schedule the vendor advisory calls for. Verify version status after upgrade in Help > About.

Second, audit your MFT exposure. Find every MOVEit Automation instance — including any still carrying the legacy MOVEit Central or Ipswitch MOVEit Central branding in your inventory. Legacy environments often get upgraded in place rather than rebuilt, which leaves stranded components that miss patch cycles. Long-running automation environments are exactly where unmanaged instances hide.

Third, restrict network exposure on the service backend command port interfaces. These should not be reachable from the public internet. Confirm that access is restricted to known authorized systems and validate the restriction with a network scan rather than a configuration review. Kiteworks 2025 MFT Survey Report data shows that 63% of organizations have not integrated MFT with SIEM or SOC — which means even if exposure changes, most teams will not see it in their monitoring.

Fourth, review audit logs for the period between disclosure and patch. Look for unexpected privilege changes, new administrative accounts, anomalous activity tied to the backend service interfaces, and any file transfers that do not match documented workflow patterns. Per the 2026 Black Kite Third-Party Breach Report, the median public disclosure lag for third-party breaches is 73 days. Discovery in your own environment is faster than waiting for someone else to tell you.

Fifth, put the architectural review on the calendar for this quarter. The question is not whether to patch MOVEit — you already are. The question is how many more MFT-class vulnerability cycles your team and your business can absorb on the current architecture. Kiteworks 2025 MFT Survey Report data shows that 62% of organizations operate fragmented systems across MFT, email, file sharing, and web forms. Each of those fragments is a separate emergency response posture in waiting.

Sixth, raise the conversation with Legal and Compliance. Once a CVE is published in the NVD, organizations are on constructive notice for compliance frameworks that mandate remediation of known vulnerabilities. The discovery posture changes the moment the disclosure happens. Document the patch timeline, the audit review, and the architectural decision. The defensibility of the response depends on the evidence trail, not the speed of the patch alone.

The closing question is not whether MOVEit Automation will be exploited in the wild. It may. It may not. The defensible question, for every organization moving sensitive data through MFT software, is whether the next critical disclosure will be a scramble or a footnote. The architecture decides.

Frequently Asked Questions

Patch first. Upgrade to MOVEit Automation 2025.1.5, 2025.0.9, or 2024.1.8 using the full installer, then verify the build under Help > About. Progress states there is no workaround. Restrict service backend command port interfaces from public internet exposure. Then review audit logs for the disclosure-to-patch window. See the Progress advisory for version details.

Yes, in a meaningful sense. Once a CVE is published in the National Vulnerability Database, organizations are on constructive notice for frameworks that require remediation of known vulnerabilities — HIPAA, CMMC, SEC disclosure, state breach laws. Kiteworks Data Security and Compliance Risk: 2025 MFT Survey Report found 59% of organizations had MFT incidents; documented remediation timing is part of any defensible compliance position.

MOVEit Transfer and MOVEit Automation are different products. CVE-2023-34362 was SQL injection in MOVEit Transfer, exploited by Cl0p before public disclosure per CISA Advisory AA23-158a. CVE-2026-4670 and CVE-2026-5174 are authentication bypass and privilege escalation in MOVEit Automation, with no confirmed in-the-wild exploitation as of disclosure. The lesson carries; the specific facts do not.

Kiteworks Data Security and Compliance Risk: 2025 MFT Survey Report data is direct: Organizations with 90 to 100% MFT automation report a 29% incident rate versus 71% for those under 50% automation. 63% have not integrated MFT with SIEM. Consolidated platforms were over-represented among incident-free organizations in the survey. The argument is empirical, not aspirational.

CMMC 2.0 Level 2 requires documented remediation of known vulnerabilities under the Risk Assessment and System and Information Integrity control families. A CVSS 9.8 MFT vulnerability in scope creates audit findings if remediation timing is not documented. Kiteworks Data Security and Compliance Risk: 2025 MFT Survey Report noted that fragmented architectures complicate evidence collection across multiple controls simultaneously.

Get started.

It’s easy to start ensuring regulatory compliance and effectively managing risk with Kiteworks. Join the thousands of organizations who are confident in how they exchange private data between people, machines, and systems. Get started today.

Table of Content
Share
Tweet
Share
Explore Kiteworks