Skip to content

Commit 582f2c0

Browse files
authored
Release-Sep-24-2025 Emergency (#25402)
Release-Sep-24-2025 Emergency (#25402)
1 parent dbb7cff commit 582f2c0

File tree

1 file changed

+44
-0
lines changed

1 file changed

+44
-0
lines changed
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
---
2+
title: "WAF Release - 2025-09-24 - Emergency"
3+
description: Cloudflare WAF managed rulesets 2025-09-24 emergency release
4+
date: 2025-09-24
5+
---
6+
7+
import { RuleID } from "~/components";
8+
9+
This week highlights a critical vendor-specific vulnerability: a deserialization flaw in the License Servlet of Fortra’s GoAnywhere MFT. By forging a license response signature, an attacker can trigger deserialization of arbitrary objects, potentially leading to command injection.
10+
11+
**Key Findings**
12+
13+
* GoAnywhere MFT (CVE-2025-10035): Deserialization vulnerability in the License Servlet that allows attackers with a forged license response signature to deserialize arbitrary objects, potentially resulting in command injection.
14+
15+
**Impact**
16+
17+
GoAnywhere MFT (CVE-2025-10035): Exploitation enables attackers to escalate privileges or achieve remote code execution via command injection.
18+
19+
<table style="width: 100%">
20+
<thead>
21+
<tr>
22+
<th>Ruleset</th>
23+
<th>Rule ID</th>
24+
<th>Legacy Rule ID</th>
25+
<th>Description</th>
26+
<th>Previous Action</th>
27+
<th>New Action</th>
28+
<th>Comments</th>
29+
</tr>
30+
</thead>
31+
<tbody>
32+
<tr>
33+
<td>Cloudflare Managed Ruleset</td>
34+
<td>
35+
<RuleID id="8fe242c7c0d64d689f4fc9a1e08b39f3" />
36+
</td>
37+
<td>100787</td>
38+
<td>Fortra GoAnywhere - Auth Bypass - CVE:CVE-2025-10035</td>
39+
<td>N/A</td>
40+
<td>Block</td>
41+
<td>This is a New Detection</td>
42+
</tr>
43+
</tbody>
44+
</table>

0 commit comments

Comments
 (0)