

We urge customers to make sure they only download the patch from our knowledgeīase and not from any third-party sites. If MOVEit Transfer customers have not yet applied this patch, it is essential that they do so as soon as possible by following the steps outlined in the knowledge base article. They have concluded that the patch addresses all elements needed to exploit the vulnerability and have attested to that

Our third-party forensics company has conducted testing of the patch against a controlled unpatched instance of MOVEit Transfer.

We have also implemented a series of third-party validations to ensure the patch has corrected the exploit. To address the vulnerability, made it available to our MOVEit Transfer customers, and patched and re-enabled MOVEit Cloud, all within 48 hours. We disabled web access to MOVEit Cloud to protect our Cloud customers, developed a security patch When we discovered the vulnerability, we promptly launched an investigation, alerted MOVEit customers of the issue and provided immediate mitigations steps. Updates through our knowledge base articles, customer emails and one-on-one support, doing everything we can to put the information customers need in their hands, and to make sure the software they use to run their business is as secure as possible. Since this vulnerability was discovered, we have been working around the clock to protect our customers and to provide critical information in a timely manner. Our customers have been, and will always be, our top priority. Provides further details about the steps we are taking to promote the security of these products and the urgent actions customers should take to address this issue. To best serve our MOVEit customers and provide the information they need to protect their environments, we will continue to be as transparent as possible regarding the recently discovered vulnerability within MOVEit Transfer and MOVEit Cloud.
