Concise Cyber

Subscribe below for free to get these delivered straight to your inbox

Advertisements
Progress ShareFile Critical Vulnerabilities: Analyzing the CVE-2026-2699 and CVE-2026-2701 RCE Chain
Advertisements

Managed File Transfer (MFT) solutions have become a frequent target for sophisticated threat actors, ranging from ransomware gangs to APT groups. A recent investigation by watchTowr Labs has uncovered a critical vulnerability chain in Progress ShareFile, enabling pre-authenticated Remote Code Execution (RCE). This discovery underscores the ongoing risks associated with file-handling software exposed to the public internet.

Understanding the Storage Zone Controller

Progress ShareFile operates a hybrid architecture that includes an on-premises component known as the Storage Zone Controller. This customer-managed gateway allows organizations to store files on their own local servers or private cloud buckets while still utilizing ShareFile’s SaaS interface for management. This architecture is often chosen to satisfy data sovereignty or regulatory requirements. Recent scans suggest that approximately 30,000 instances of this controller are currently accessible online, representing a significant attack surface.

The Vulnerability Chain: CVE-2026-2699 and CVE-2026-2701

The research specifically targeted the 5.x branch of the Storage Zone Controller, which is built on the ASP.NET framework. By combining two distinct flaws, researchers were able to achieve full system compromise without any valid user credentials:

  • CVE-2026-2699: An authentication bypass vulnerability that allows unauthorized users to gain entry to sensitive application logic.
  • CVE-2026-2701: A remote code execution flaw that allows an attacker to run arbitrary commands on the underlying server once authentication is bypassed.
  • Version Specificity: These vulnerabilities were identified in version 5.12.3 and are specific to the legacy ASP.NET 5.x branch, rather than the newer .NET Core 6.x branch.

Impact and Technical Remediation

The security analysis involved decompiling application DLLs and investigating REST endpoints within the Internet Information Services (IIS) setup. Researchers focused on identifying how the application processes external requests before authentication is established. The resulting exploit chain allows for a complete takeover of the Storage Zone Controller, potentially exposing all files managed by that specific instance.

Progress has responded to these findings by releasing version 5.12.4 on March 10, 2026. This patch resolves the vulnerabilities in the 5.x branch and is essential for all organizations running on-premises infrastructure for ShareFile. Administrators are urged to verify their current versioning and apply the update immediately to prevent exploitation.

In conclusion, the discovery of CVE-2026-2699 and CVE-2026-2701 serves as a stark reminder of the security challenges inherent in MFT solutions. As threat actors continue to prioritize these gateways, rapid patching and rigorous vulnerability research remain the best defenses for modern enterprises.

All articles are written here with the help of AI on the basis of openly available information which cannot be independently verified. We do strive to quote the relevant sources.The intent is only to summarise what is already reported in public forum in our own wordswith no intention to plagarise or copy other person’s work.The publisher has no intent to defame or cause offence to anyone, any person or any organisation at any moment.The publisher assumes no responsibility for any damage or loss caused by making decisions on the basis of whatever is published on cyberconcise.com.You’re advised to do your own checks and balances before making any decision, and owners and publishers at cyberconcise.com cannot be held accountable for its resulting ramifications.If you have any objections, concerns or point out anything factually incorrect, please reach out using the form on https://concisecyber.com/about/

Discover more from Concise Cyber

Subscribe now to keep reading and get access to the full archive.

Continue reading