CVE-2023-0669
ENISA EUVD: EUVD-2023-0644 ↗
Exploited in the Wild
✓ Confirmed 0-Day
Triaged: March 20, 2026
12 articles
Published: 2023-02-06
EPSS Score
Source: FIRST.org · 2026-05-23
94.38%
probability
This CVE has a 94.38% probability
of being exploited in the next 30 days.
0%
Top 100.0th percentile of all CVEs
100%
CVSS v3.1
Source: VulnerabilityLookup (CIRCL)7.2
HIGH
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Description
VulnerabilityLookup (CNA)Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2.
Affected Products
Fortra
Goanywhere MFT
0
Attack Intelligence
Exploits & PoC
0xf4n9x/CVE-2023-0669
CVE-2023-0669 GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an
103
2024-04-16
Avento/CVE-2023-0669
GoAnywhere MFT CVE-2023-0669 LicenseResponseServlet Deserialization Vulnerabilities Python RCE PoC(Proof of Concept)
8
2023-07-07
yosef0x01/CVE-2023-0669-Analysis
CVE analysis for CVE-2023-0669
7
2023-03-12
cataliniovita/CVE-2023-0669
CVE-2023-0669 GoAnywhere MFT command injection vulnerability
0
2023-02-15
0
2023-02-21
0
2025-12-24
6 repos — triés par ⭐
Rechercher sur GitHub ↗
https://infosec.exchange/@briankrebs/109795710941843934
media-coverage
https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis
third-party-advisory
Signal Intelligence
Confidence
92%
EPSS
94.38%
CVSS v3.1
7.2
Mentions
12
Last Seen
May 08, 2025
CNA Information
CNA Assigner
rapid7
CNA Title
Fortra GoAnywhere MFT License Response Servlet Command Injection
Analyst Note
CVE-2023-0669 is explicitly identified as a zero-day RCE vulnerability in Fortra's GoAnywhere MFT tool with active ransomware exploitation documented. TheHackerNews article directly states 'zero-day remote code execution (RCE) vulnerability' and 'active exploitation by ransomware actors,' confirming exploitation in the wild prior to or concurrent with patch availability.
Threat Actors 16
Lazarus Group
apt_group
Information theft and espionage
🇰🇵 KP
Turla Group
apt_group
Information theft and espionage
Russian Federation
APT 29
apt_group
Information theft and espionage
🇷🇺 RU
Cobalt
apt_group
Financial crime
🇷🇺 RU
Cron
apt_group
🇷🇺 RU
SaintBear
apt_group
Information theft and espionage
🇷🇺 RU
APT3
apt_group
Information theft and espionage
🇨🇳 CN
ELECTRUM
apt_group
Information theft and espionage
🇷🇺 RU
TA505
apt_group
Financial gain
🇷🇺 RU
Infy
apt_group
Information theft and espionage
🇮🇷 IR
APT31
apt_group
Information theft and espionage
🇨🇳 CN
CL-STA-0043
apt_group
Information theft and espionage
🇨🇳 CN
Operation Diplomatic Specter
apt_group
Information theft and espionage
🇨🇳 CN
Mana Team
apt_group
🇨🇳 CN
SharpPanda
apt_group
Information theft and espionage
🇨🇳 CN
APT 5
apt_group
Information theft and espionage
🇨🇳 CN
Triage Info
Decided atMar 20, 2026
Published DateFeb 06, 2023