Fortra GoAnywhere MFT: SSH Key Brute Force Vulnerability Discovered
The National Vulnerability Database has detailed a critical flaw in Fortra’s GoAnywhere Managed File Transfer (MFT) solution. Specifically, versions prior to 7.10.0 fail to enforce login limits when a web user is configured for SSH Key authentication. This oversight allows attackers to brute-force SSH keys, bypassing intended security controls.
This vulnerability, flagged with a CVSS score of 7.3 (HIGH), stems from CWE-307, which relates to improper restriction of operations within the user’s authentication cycle. The lack of login throttling on SSH key-based authentication presents a direct pathway for unauthorized access if an attacker can guess the private key.
What This Means For You
- If your organization uses Fortra GoAnywhere MFT version prior to 7.10.0 and employs SSH key authentication for web users, you must patch to version 7.10.0 or later immediately. Review your access logs for any suspicious brute-force attempts targeting SSH keys.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
Fortra GoAnywhere MFT SSH Key Brute Force Attempt - CVE-2025-14362
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2025-14362 | Vulnerability | CVE-2025-14362 |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 21, 2026 at 18:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.