Exclusive Webinar: Deep Session Inspection and rich metadata can change your security game.

CVE-2025-10035

CVE‑2025‑10035: Critical Deserialization in GoAnywhere MFT Enables Remote Command Execution

Vulnerability Overview 

CVE ID: CVE202510035 

CVE Title: Deserialization flaw in GoAnywhere MFT License Servlet 

Severity: Critical  

Exploit Status: Actively exploited — added to CISA’s KEV; public PoCs/repositories available. 

Business Risk: Remote unauthenticated takeover (if Admin Console exposed) — data theft, ransomware, major outages. 

Compliance Impact: May trigger regulatory breaches if sensitive data is exposed.

Summary

CVE-2025-10035 is a critical flaw in Fortra’s GoAnywhere MFT License Servlet. It lets attackers with a forged license response trigger deserialization of malicious objects, leading to remote code execution if the Admin Console is exposed. Active exploitation, including ransomware use, has been reported by vendors and security researchers.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2025-10035?

Technical Overview

How Does the CVE-2025-10035 Exploit Work?

The attack typically follows these steps:

CVE‑2025‑10035-01 Exploitation Path

What Causes CVE-2025-10035?

Vulnerability Root Cause:  

CVE-2025-10035 is caused by unsafe deserialization in GoAnywhere MFT’s License Servlet. Attackers can send a fake license response to make the server run malicious code. Systems with the Admin Console exposed online face the highest risk. Look for SignedObject.getObject in logs as an indicator of exploitation.

How Can You Mitigate CVE-2025-10035?

If immediate patching is delayed or not possible:  

  • Block public access to the Admin Console; allow only VPN, jump host, or trusted IPs. 
  • Restrict network access with firewalls or segmentation to limit Admin Console reach. 
  • Check logs for SignedObject.getObject errors and unexpected admin accounts. 
  • Monitor for suspicious activity like large uploads or unusual outbound connections. 
  • Use IDS/IPS to detect exploitation attempts. 
  • Isolate suspected hosts if compromise is suspected. 
  • Enforce least-privilege on all GoAnywhere accounts and services. 
  • Patch immediately — GoAnywhere 7.8.4 or Sustain 7.6.3.

Which Assets and Systems Are at Risk?

Asset Types Affected:

Business-Critical Systems at Risk:

Exposure Level:

Will Patching CVE-2025-10035 Cause Downtime?

Patch application impact: Low. Apply the fix in GoAnywhere MFT 7.8.4 or Sustain 7.6.3. Most systems can be updated with minimal downtime if proper testing and deployment procedures are followed. 

Mitigation (if immediate patching is not possible):  

  • Restrict access to the Admin Console (VPN, jump host, or trusted IPs only). 
  • Use firewalls and network segmentation to limit exposure. 
  • Monitor logs for SignedObject.getObject errors and unusual admin activity. 
  • Enable alerts for abnormal data transfers or high-volume traffic.

How Can You Detect CVE-2025-10035 Exploitation?

Exploitation Signatures:

Indicators of Compromise (IOCs/IOAs):

Behavioral Indicators:

Alerting Strategy:

Remediation & Response

Mitigation Steps if No Patch:

Remediation Timeline:

Rollback Plan:

Incident Response Considerations:

Compliance & Governance Notes

Audit Trail Requirement:

Policy Alignment:

CVSS Breakdown Table

MetricValue Description
Base Score10.0Maximum severity reported in vendor and industry sources
Attack VectorNetworkExploitable remotely over the network
Attack ComplexityLowNo special conditions required per advisories
Privileges RequiredNoneNo credentials required to trigger exploitation
User Interaction NoneExploit does not require user action
Scope Changed Exploitation can affect components beyond the vulnerable code (leading to system compromise)
Confidentiality Impact HighSuccessful exploitation can expose sensitive transferred data
Integrity ImpactHighExploit can enable unauthorized modification of files or system state
Availability ImpactHighExploitation can cause full system takeover and operational disruption

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.