Incident Analysis

Cleo MFT CVE-2024-50623 Supply Chain Postmortem

Cleo's managed file transfer products became the next MOVEit. A postmortem on CVE-2024-50623, the Cl0p exploitation, and the file-transfer software risk class.

Yukti Singhal
Threat Intel Analyst
5 min read

In October 2024, Cleo disclosed CVE-2024-50623, an unrestricted file upload vulnerability in its Harmony, VLTrader, and LexiCom managed file transfer products. The patch was incomplete, the vulnerability was being exploited before disclosure, and by mid-December the Cl0p ransomware group claimed responsibility for compromises at dozens of named enterprises. The incident was the third major managed file transfer disaster in eighteen months, after MOVEit and GoAnywhere, and made the structural problem with this product category impossible to ignore.

This postmortem walks through the timeline, the patch failure, and the systemic risk that this software class continues to carry.

What is the technical anatomy of CVE-2024-50623?

CVE-2024-50623 was a file upload and execution flaw affecting Cleo Harmony, VLTrader, and LexiCom versions prior to 5.8.0.21. The vulnerability allowed an unauthenticated remote attacker to upload arbitrary files into a directory from which the application's autorun functionality would execute them. The execution context was the application service account, typically a high-privilege Windows service account with access to the customer data being transferred through the product. Cleo published an initial patch on October 27, 2024 alongside the CVE disclosure. Within days, security researchers at Huntress confirmed that the patch was incomplete and the vulnerability remained exploitable. A second CVE, CVE-2024-55956, was issued on December 10, 2024 to track the patch bypass, and Cleo released version 5.8.0.24 as the complete fix.

How did Cl0p exploit the window?

The Cl0p ransomware group, the same operators responsible for the earlier MOVEit and GoAnywhere mass exploitation campaigns, began exploiting CVE-2024-50623 in September or early October 2024, weeks before public disclosure. Telemetry from incident responders indicates a small number of compromises during the pre-disclosure window followed by an aggressive scaling-up between November and December 2024 as the patch-bypass window widened. By Cl0p's December 24 public claim, they listed roughly 66 confirmed victims, with subsequent additions through Q1 2025 bringing the total to over 100 disclosed organizations.

Victims included healthcare networks, manufacturing firms, logistics providers, and a number of payroll-processing vendors whose exposure created downstream customer notification cascades. Hertz, Western Alliance Bancorporation, and Blue Yonder were among the named victims, with several others remaining undisclosed under regulatory non-disclosure provisions.

Why does managed file transfer software keep producing these incidents?

The structural reason MFT software keeps producing these incidents is the combination of three properties. First, it sits at the perimeter, internet-exposed by design so external partners can deliver files. Second, it processes high-value data, typically the most sensitive business-to-business exchange traffic in an organization. Third, the product category is dominated by a small number of long-lived vendors whose codebases predate modern secure development practices and whose customer base depends on backwards compatibility, which limits aggressive refactoring.

The MOVEit incident exploited CVE-2023-34362 in May 2023, the GoAnywhere incident exploited CVE-2023-0669 in January 2023, and Cleo followed in October 2024. The same threat actor exploited all three. The structural similarity is not coincidental. Cl0p has explicitly invested in research against this product category because the leverage per CVE is unusually high.

What does the patch failure tell us?

The patch failure on CVE-2024-50623 highlighted a broader pattern in vendor security response. The initial fix addressed a specific code path but did not eliminate the underlying class of vulnerability, which is the unsafe handling of file uploads combined with the autorun execution pattern. A defense-in-depth response would have required eliminating the autorun functionality or sandboxing it, neither of which was practical inside a fast-release patch window. Vendors under time pressure tend to ship the narrowest possible fix, and customers under time pressure to apply patches do not have visibility into whether the fix addresses the class or only the instance.

The post-incident analysis recommended that customers running MFT software architecturally segment it from internal networks, restrict outbound connectivity from the MFT host, and apply application allowlisting to the service account context. These are control surfaces customers can apply without depending on vendor patch completeness.

What should procurement teams change in 2026?

Procurement teams should treat MFT software as a special risk category, distinct from general enterprise applications. The procurement questions should include exposure of the product to internet ingress, whether the architecture supports a reverse-proxy or zero-trust ingress pattern that does not require direct exposure of the product itself, the vendor's track record on time-to-fix and patch completeness, and the contractual commitments around breach notification and customer support during incidents. Customers running multiple MFT products should consider consolidation onto whichever vendor has the strongest security track record, recognizing that the consolidation itself produces concentration risk that needs to be weighed.

How Safeguard Helps

Safeguard applies elevated risk weighting to managed file transfer products in TPRM and asset inventory, reflecting the structural risk this category carries. Griffin AI correlates emerging MFT-class CVEs against your fleet within minutes of disclosure and surfaces patch completeness assessments based on security research community signal, not just vendor advisories. Reachability and exposure analysis maps which MFT instances are internet-accessible and which have customer data flowing through them, sizing incident response to actual risk rather than fleet-wide patch counts. Policy gates can quarantine MFT versions where active in-the-wild exploitation is confirmed, even if the vendor has issued a putative fix that researchers have flagged as incomplete.

Never miss an update

Weekly insights on software supply chain security, delivered to your inbox.