INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global phishing Multiple sectors HIGH 34m Global insider Cybersecurity Services CRITICAL 43m Global ransomware Multiple sectors (U.S. companies) CRITICAL 57m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 34m Global insider Cybersecurity Services CRITICAL 43m Global ransomware Multiple sectors (U.S. companies) CRITICAL 57m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 34m Global insider Cybersecurity Services CRITICAL 43m Global ransomware Multiple sectors (U.S. companies) CRITICAL 57m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h
Vulnerabilities

CVE-2023-34362

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Progress MOVEit Transfer SQL Injection Vulnerability — Progress MOVEit Transfer contains a SQL injection vulnerability that could allow an unauthenticated attacker to gain unauthorized access to MOVEi
Published: Jun 2, 2023  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Progress MOVEit Transfer SQL Injection Vulnerability — Progress MOVEit Transfer contains a SQL injection vulnerability that could allow an unauthenticated attacker to gain unauthorized access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database in addition to executing SQL statements that alter or delete database elements.

🤖 AI Executive Summary

CVE-2023-34362 is a critical SQL injection vulnerability in Progress MOVEit Transfer, a widely-used managed file transfer (MFT) solution, with a CVSS score of 9.0. An unauthenticated remote attacker can exploit this flaw to gain unauthorized access to the MOVEit database, exfiltrate sensitive data, and manipulate or delete database records. This vulnerability was actively exploited in the wild by the Cl0p ransomware group as a zero-day, resulting in one of the largest data breach campaigns of 2023 affecting hundreds of organizations globally. Given the availability of public exploits and the sensitivity of data typically transiting MFT platforms, immediate patching and forensic investigation are critically urgent.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 18, 2026 05:29
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations across multiple critical sectors are at significant risk. Banking and financial institutions regulated by SAMA that use MOVEit Transfer for secure document exchange and regulatory reporting face exposure of highly sensitive financial and customer PII data. Government entities under NCA oversight using MOVEit for inter-agency file transfers risk exposure of classified or sensitive government data. Energy sector organizations including Saudi Aramco and NEOM-related contractors that rely on MFT solutions for operational data sharing face potential operational disruption and data exfiltration. Healthcare organizations using MOVEit for patient record transfers risk PDPL (Personal Data Protection Law) violations. Telecom providers such as STC and Zain KSA using MFT for billing and subscriber data transfers are also at elevated risk. The Cl0p group's extortion model — threatening public data dumps — amplifies reputational and regulatory risk for Saudi entities subject to NCA and SAMA reporting obligations.
🏢 Affected Saudi Sectors
Banking Government Energy Healthcare Telecom Defense Education Retail
⚖️ Saudi Risk Score (AI)
9.7
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS (within 24 hours):
1. Isolate MOVEit Transfer servers from the internet immediately if patching cannot be completed within hours.
2. Disable all HTTP and HTTPS traffic to MOVEit Transfer environments as a temporary compensating control.
3. Review all MOVEit Transfer logs for indicators of compromise (IOCs): look for unexpected files in C:\MOVEitTransfer\wwwroot\ (e.g., .aspx webshells), unauthorized user accounts, and anomalous database queries.
4. Search for known Cl0p webshell filenames: human2.aspx, _human2.aspx, and similar variants.

PATCHING GUIDANCE:
5. Apply Progress Software patches immediately: MOVEit Transfer 2023.0.1, 2022.1.5, 2022.0.4, 2021.1.4, 2021.0.6 or later versions.
6. Verify patch integrity using checksums provided by Progress Software.
7. After patching, reset all service account credentials and API keys associated with MOVEit.

COMPENSATING CONTROLS (if patching is delayed):
8. Implement IP allowlisting to restrict MOVEit Transfer access to known trusted IP ranges only.
9. Deploy WAF rules to block SQL injection patterns targeting MOVEit endpoints.
10. Enable enhanced logging and forward logs to SIEM for real-time alerting.

DETECTION RULES:
11. SIEM rule: Alert on creation of new .aspx files in MOVEit web directories.
12. SIEM rule: Alert on new privileged user account creation in MOVEit database.
13. Network rule: Alert on outbound connections from MOVEit servers to unknown external IPs.
14. Conduct full forensic investigation of MOVEit servers even after patching to confirm no prior compromise.
15. Report any confirmed breach to NCA and relevant sector regulators (SAMA/CITC) per mandatory incident reporting timelines.
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية (خلال 24 ساعة):
1. عزل خوادم MOVEit Transfer عن الإنترنت فورًا إذا تعذّر تطبيق التصحيح خلال ساعات.
2. تعطيل جميع حركة مرور HTTP وHTTPS إلى بيئات MOVEit Transfer كإجراء تعويضي مؤقت.
3. مراجعة جميع سجلات MOVEit Transfer للكشف عن مؤشرات الاختراق: البحث عن ملفات غير متوقعة في المسار C:\MOVEitTransfer\wwwroot\ (مثل قذائف الويب .aspx)، والحسابات غير المصرح بها، واستعلامات قاعدة البيانات الشاذة.
4. البحث عن أسماء ملفات قذائف الويب المعروفة لمجموعة Cl0p: human2.aspx و_human2.aspx والمتغيرات المشابهة.

إرشادات التصحيح:
5. تطبيق تصحيحات Progress Software فورًا: الإصدارات 2023.0.1 و2022.1.5 و2022.0.4 و2021.1.4 و2021.0.6 أو الأحدث.
6. التحقق من سلامة التصحيح باستخدام المجاميع الاختبارية المقدمة من Progress Software.
7. بعد التصحيح، إعادة تعيين جميع بيانات اعتماد حسابات الخدمة ومفاتيح API المرتبطة بـ MOVEit.

ضوابط التعويض (في حالة تأخر التصحيح):
8. تطبيق قائمة السماح بعناوين IP لتقييد الوصول إلى MOVEit Transfer على النطاقات الموثوقة فقط.
9. نشر قواعد جدار حماية تطبيقات الويب (WAF) لحجب أنماط حقن SQL التي تستهدف نقاط نهاية MOVEit.
10. تفعيل التسجيل المحسّن وإرسال السجلات إلى نظام SIEM للتنبيه الفوري.

قواعد الكشف:
11. قاعدة SIEM: التنبيه عند إنشاء ملفات .aspx جديدة في مجلدات الويب الخاصة بـ MOVEit.
12. قاعدة SIEM: التنبيه عند إنشاء حساب مستخدم متميز جديد في قاعدة بيانات MOVEit.
13. قاعدة الشبكة: التنبيه عند الاتصالات الصادرة من خوادم MOVEit إلى عناوين IP خارجية غير معروفة.
14. إجراء تحقيق جنائي كامل في خوادم MOVEit حتى بعد التصحيح للتأكد من عدم وجود اختراق سابق.
15. الإبلاغ عن أي اختراق مؤكد إلى الهيئة الوطنية للأمن السيبراني والجهات التنظيمية المختصة (ساما/هيئة الاتصالات) وفق مواعيد الإبلاغ الإلزامية.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-4-2: Cybersecurity Event Management — mandatory incident reporting to NCA ECC-2-3-1: Secure Configuration Management — unpatched critical systems ECC-2-5-1: Vulnerability Management — failure to remediate critical CVEs ECC-2-6-1: Penetration Testing and Vulnerability Assessment ECC-2-9-1: Data and Information Protection — unauthorized database access ECC-3-3-1: Web Application Security — SQL injection prevention
🔵 SAMA CSF
Cybersecurity Risk Management — 3.3: Risk Assessment and Treatment Cybersecurity Operations — 4.3: Vulnerability Management Cybersecurity Operations — 4.5: Incident Management and Response Cybersecurity Operations — 4.7: Threat Intelligence Data and Information Protection — 3.7: Data Leakage Prevention Third-Party Cybersecurity — 3.9: Vendor Risk Management for MFT solutions
🟡 ISO 27001:2022
A.8.8: Management of technical vulnerabilities A.8.25: Secure development life cycle A.8.28: Secure coding (SQL injection prevention) A.5.30: ICT readiness for business continuity A.8.15: Logging A.5.26: Response to information security incidents A.8.12: Data leakage prevention
🟣 PCI DSS v4.0
Requirement 6.3.3: All system components protected from known vulnerabilities by patching Requirement 6.4.1: Web-facing applications protected against attacks including SQL injection Requirement 10.2: Audit logs implemented to detect anomalous activity Requirement 12.10: Incident response plan implemented
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Progress:MOVEit Transfer
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS94.25%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2023-06-23
Published 2023-06-02
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.7
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited ransomware
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.