CVE-2023-34362
Known Exploited Vulnerability Entry External Catalog
Entry Details
Confirmed
Yes
2023-06-02 00:00 UTC
Timestamps
2023-06-02
2023-06-02
Scope
KEV entry: Progress MOVEit Transfer SQL Injection Vulnerability | Affected: Progress / MOVEit Transfer | Description: Progress MOVEit Transfer contains a SQL injection vulnerability that could allow an unauthenticated attacker to gain unauthorized access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database in addition to executing SQL statements that alter or delete database elements. | Required action: Apply updates per vendor instructions. | Due date: 2023-06-23 | Known ransomware campaign use (KEV): Known | Notes (KEV): This CVE has a CISA AA located here: https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-158a. Please see the AA for associated IOCs. Additional information is available at: https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023.; https://nvd.nist.gov/vuln/detail/CVE-2023-34362
References
- {'id': 'CVE-2023-34362', 'url': 'https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-34362'}
1d17bd00-f86d-4692-ba03-6f52073f2a43
405284c2-e461-4670-8979-7fd2c9755a60
2026-02-02 13:24 UTC
2026-02-06 07:53 UTC
Evidence (1)
| Type | Source | Signal | Confidence | Details | GCVE Metadata |
|---|---|---|---|---|---|
| vendor_report | cisa-kev | successful_exploitation | 0.80 |
View details
|
- |