The Censys Research Team published an article yesterday about new auth bypass vulnerabilities affecting MOVEit Transfer and Gateway products, examining the state of exposed services roughly a year on from publication of a different SQL injection vulnerability associated with MOVEit Transfer.
Check out the team’s dashboard exploring exposed MOVEit services over time here and learn more in the article here.
The dashboard utilizes this Hosts Search query to identify exposed services: services.software.product: "MOVEit Transfer" and not labels: {tarpit, honeypot, truncated}
If you have questions about this research, let us know and we’ll tag in the Censys team!