Frequently Asked Questions

CVE-2023-34362 Vulnerability Details

What is CVE-2023-34362?

CVE-2023-34362 is an SQL injection (SQLi) vulnerability found in the MOVEit Transfer web application. It allows an unauthenticated attacker to gain unauthorized access to MOVEit Transfer’s database, potentially leading to data theft, manipulation, deletion, and even remote code execution (RCE). For more details, see the official advisory.

Is CVE-2023-34362 exploited in the wild?

Yes, CVE-2023-34362 was exploited in the wild during May and June 2023. Unpatched systems can be targeted via HTTP or HTTPS. At the time of reporting, there was no public proof-of-concept (PoC) exploit, but the situation may change rapidly. IONIX research continues to monitor developments. Source

Which versions of MOVEit Transfer are impacted by CVE-2023-34362?

All MOVEit Transfer versions are affected by CVE-2023-34362. Fixed versions and upgrade documentation are available for each impacted release. It is critical to apply the provided patches promptly. For a full list of affected and fixed versions, refer to the table in the official advisory.

How big is the risk from the MOVEit Transfer vulnerability?

IONIX Research found that less than 3% of organizations have publicly exposed assets running MOVEit Transfer that could be vulnerable to CVE-2023-34362. The EPSS score for this vulnerability is 0.18 (on a scale of 0 to 1), placing it in the 86th percentile of CVE vulnerabilities. If a public exploit is released, the risk could escalate quickly. Source

What steps should organizations take to mitigate CVE-2023-34362?

Organizations should:

  1. Conduct attack surface discovery to identify all assets potentially vulnerable to CVE-2023-34362.
  2. Map their digital supply chain to list internal and external assets at risk.
  3. Identify asset owners within the organization.
  4. Apply the relevant patches to all affected systems.
  5. Monitor updates from IONIX Research and the cybersecurity community.
For automated asset identification, request an IONIX scan.

IONIX Platform Features & Capabilities

What cybersecurity solutions does IONIX offer?

IONIX specializes in cybersecurity solutions focused on attack surface risk management. The platform provides Attack Surface Discovery, Risk Assessment, Risk Prioritization, and Risk Remediation. It enables organizations to discover all relevant assets, monitor changes, and reduce noise for more effective security operations. Learn more

What are the key capabilities and benefits of the IONIX platform?

Key capabilities include:

These features help organizations improve risk management, reduce mean time to resolution (MTTR), and optimize security operations. Learn more

What integrations does IONIX support?

IONIX integrates with tools such as Jira, ServiceNow, Slack, Splunk, Microsoft Sentinel, Palo Alto Cortex/Demisto, and AWS services (including AWS Control Tower, AWS PrivateLink, and Amazon SageMaker Models). For a full list, visit the IONIX Integrations page.

Does IONIX offer an API for integrations?

Yes, IONIX provides an API that supports integrations with major platforms like Jira, ServiceNow, Splunk, Cortex XSOAR, and more. For details, visit the IONIX Integrations page.

Security, Compliance & Performance

What security and compliance certifications does IONIX have?

IONIX is SOC2 compliant and supports companies with NIS-2 and DORA compliance, ensuring robust security measures and regulatory alignment.

How is IONIX rated for product performance and innovation?

IONIX earned top ratings for product innovation, security, functionality, and usability. It was named a leader in the Innovation and Product categories of the ASM Leadership Compass for completeness of product vision and a customer-oriented, cutting-edge approach to ASM. Source

Use Cases, Pain Points & Customer Success

What core problems does IONIX solve for organizations?

IONIX helps organizations address:

Who are some of IONIX's customers?

IONIX's customers include Infosys, Warner Music Group, The Telegraph, E.ON, Grand Canyon Education, and a Fortune 500 Insurance Company. For more details, visit the IONIX Customers page.

Can you share specific case studies or success stories of IONIX customers?

Yes.

What industries are represented in IONIX's case studies?

Industries include Insurance and Financial Services, Energy, Critical Infrastructure, IT and Technology, and Healthcare.

What business impact can customers expect from using IONIX?

Customers can expect improved risk management, operational efficiency, cost savings (reduced mean time to resolution), and enhanced security posture. For more details, visit this page.

Implementation, Support & Onboarding

How long does it take to implement IONIX and how easy is it to start?

Initial deployment of IONIX takes about a week and requires only one person to implement and scan the entire network. Customers have access to onboarding resources such as guides, tutorials, webinars, and a dedicated Technical Support Team. Learn more

What training and technical support is available for IONIX customers?

IONIX offers onboarding resources including guides, tutorials, webinars, and a dedicated Technical Support Team to assist during implementation and adoption. Learn more

What customer service and support does IONIX provide after purchase?

IONIX provides technical support and maintenance services during the subscription term, including troubleshooting, upgrades, and maintenance. Customers are assigned a dedicated account manager and benefit from regular review meetings. Learn more

Blog, Resources & Documentation

Where can I find IONIX's blog?

IONIX's blog offers articles and updates on cybersecurity. Read our Blog

What kind of content does the IONIX blog provide?

The IONIX blog covers topics related to cybersecurity, risk management, vulnerability management, and continuous threat exposure management. Key authors include Amit Sheps and Fara Hain. Explore the Blog

Where can I find technical documentation and resources for IONIX?

Technical documentation, guides, datasheets, and case studies are available on the IONIX Resources page.

Vulnerability Intelligence & Threat Center

What is CVE-2023-7028?

CVE-2023-7028 is an Improper Access Control Vulnerability in GitLab Community and Enterprise Editions, added to CISA's Known Exploited Vulnerabilities Catalog. CISA Advisory

What is the impact of Citrix CVE-2023-3519 on organizations?

Threat actors exploited CVE-2023-3519 to implant webshells, gain root-level access, and perform Active Directory discovery, posing significant risks to affected organizations. Read the CISA advisory

What is CVE-2024-34102 vulnerability?

CVE-2024-34102 is a vulnerability that allows arbitrary code execution through a crafted XML document referencing external entities. Exploitation does not require user interaction.

What is the impact of CVE-2024-20353?

The CVE-2024-20353 vulnerability allows an unauthenticated, remote attacker to cause a denial of service (DoS) condition by sending a crafted HTTP request.

What are the potential risks of CVE-2025-24813?

Risks include:

What is the CVE-2024-20359 vulnerability?

The CVE-2024-20359 vulnerability is addressed in a Cisco Advisory.

Go back to All Blog posts

CVE-2023-34362: SQLi Zero Day Vulnerability in MOVEit Transfer exploited in the wild 

Amit Sheps
Amit Sheps Director of Product Marketing LinkedIn
June 5, 2023
CVE-2023-34362 

What is CVE-2023-34362? 

Note: The updated announcement was originally made on June 5th and updated July 31st.

CVE-2023-34362 is an SQL injection (SQLi) vulnerability that has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain unauthorized access to MOVEit Transfer’s database.  

SQL Injection (SQLi) poses significant risks as it allows attackers to potentially steal, manipulate, or delete sensitive data from databases. Furthermore, SQLi vulnerabilities can also lead to Remote Code Execution (RCE), enabling attackers to execute malicious code and compromise the affected system. 

According to the advisory released by Progress, depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL) the attacker has the potential to infer information about the structure and contents of the database, in addition to executing SQL statements that can modify or delete elements within the database. 

Is CVE-2023-34362 exploited in the wild? 

According to reports, CVE-2023-34362 is exploited in the wild in May and June 2023. Note that unpatched systems can be exploited via HTTP or HTTPS. At this point, there is no PoC or documented exploit for this CVE. IONIX research is tracking the development of this zero day vulnerability and will update on any changes.  

Which version of MOVEit Transfer has been impacted?

All MOVEit Transfer versions are affected by this vulnerability. The software has been updated with fixed versions (refer to the table below), and it is crucial to promptly apply the provided patches. 

Affected Version Fixed Version Documentation 
MOVEit Transfer 2023.0.0 (15.0) MOVEit Transfer 2023.0.1 MOVEit 2023 Upgrade Documentation 
MOVEit Transfer 2022.1.x (14.1) MOVEit Transfer 2022.1.5 MOVEit 2022 Upgrade Documentation 
MOVEit Transfer 2022.0.x (14.0) MOVEit Transfer 2022.0.4 
MOVEit Transfer 2021.1.x (13.1) MOVEit Transfer 2021.1.4 MOVEit 2021 Upgrade Documentation 
MOVEit Transfer 2021.0.x (13.0) MOVEit Transfer 2021.0.6 
MOVEit Transfer 2020.1.x (12.1) Special Patch Available See KB 000234559 
MOVEit Transfer 2020.0.x (12.0) or older MUST upgrade to a supported version See MOVEit Transfer Upgrade and Migration Guide 
MOVEit Cloud MOVEit Transfer 14.1.4.94 
MOVEit Transfer 14.0.3.42 
All MOVEit Cloud systems are fully patched at this time. 
Cloud Status Page 

How big is the risk from the MOVEit Transfer Vulnerability? 

IONIX Research conducted non-intrusive scans to identify assets that are at risk to CVE-2023-34362 across our customer base and our database of enterprises. Our findings showed that less than 3% of the organizations have publicly exposed assets running MOVEit Transfer that could potentially be vulnerable to CVE-2023-34362. 

While the vulnerability is exploited in the wild, until there is a documented Exploit PoC it’s hard to understand the complexity and success rate. For this reason, the EPSS score of CVE-2023-34362 is 0.18 (on a scale of 0 to 1), positioning it within the 86th percentile of CVE vulnerabilities. For comparison, issues that are classified by the IONIX research team as immediately exploitable (e.g., Log4Shell) have EPSS very close to 1.  

If and when a PoC is published the situation may become critical in an instant. 

Accelerating mitigation of CVE-2023-34362 

The best practice is to patch every component that is potentially vulnerable to the MOVEit Transfer CVE. The first step requires you to identify every such asset across your attack surface and its digital supply chain. 

Here are the steps: 

  1. Conduct an attack surface discovery
     
  2. Map your digital supply chain list all internal and digital supply chain assets that may be vulnerable to CVE-2023-34362 
  1. Identify owners of these assets within your organization 
  1. Mobilize patching to ensure your assets and organizations are safe 
  1. Stay tuned for developments from IONIX Research and the community 

If you require assistance in identifying relevant assets and determining whether MOVEit is directly or indirectly impacting them (e.g., through their digital supply chain), ask us for an automated scan, today. 

WATCH A SHORT IONIX DEMO

See how easy it is to implement a CTEM program with IONIX. Find and fix exploits fast.