Two critical vulnerabilities in Progress ShareFile’s Storage Zones Controller (SZC), tracked as CVE-2026-2699 and CVE-2026-2701, can be chained by an unauthenticated attacker to achieve remote code execution on any exposed server running the affected software. watchTowr Labs published the full technical analysis on 2 April 2026 following coordinated disclosure with Progress, which had shipped the fix in version 5.12.4 on 10 March. The gap between the silent patch and the public writeup has now closed, and organisations that delayed upgrading face immediate risk.
The Attack Chain
The first vulnerability, CVE-2026-2699, is an authentication bypass caused by improper handling of execution-after-redirect behaviour in the /ConfigService/Admin.aspx endpoint. By exploiting the redirect logic, an unauthenticated attacker can access restricted administrative functions of the Storage Zones Controller without supplying valid credentials.
The second vulnerability, CVE-2026-2701, is an arbitrary file upload and extraction flaw that, when reached from an administrative session, allows an attacker to upload malicious archive content and have it extracted into a web-accessible directory on the server.
Chaining the two is straightforward: CVE-2026-2699 provides unauthenticated access to the administrative file upload functionality; CVE-2026-2701 allows a malicious ASPX webshell to be placed in a location the IIS web server will execute. Once the webshell is in place, the attacker has operating-system-level command execution on the server.
Scale of Exposure
watchTowr’s internet-wide scanning identified approximately 30,000 Storage Zone Controller instances with publicly reachable management interfaces. Progress ShareFile is heavily deployed in professional services, legal, financial services, and healthcare sectors — environments where the confidentiality of managed file transfers is business-critical and regulatory obligations apply. A compromised SZC gives an attacker access to all files stored within that zone and a pivot point into the broader corporate network.
This is not the first time Progress’s file transfer software has attracted serious attention. The MOVEit Transfer mass exploitation campaign in 2023 affected hundreds of organisations globally and led to widespread data theft. Threat actors targeting Progress software have historically moved quickly once technical details are public.
Why the Timing Is Dangerous
Progress released version 5.12.4 on 10 March without detailed public disclosure of the vulnerability classes involved. Many organisations running SZC would have assessed this as a routine maintenance update and deprioritised it. The watchTowr publication from 2 April changes the risk calculus entirely: any motivated threat actor can now construct a working exploit from the published technical analysis. The window between “silent patch” and “public PoC” is closed.
Security teams that have not upgraded Storage Zones Controller since 10 March should escalate this to critical priority and treat potentially exposed servers as compromised pending investigation.
Recommended Actions
- Upgrade Storage Zones Controller to version 5.12.4 immediately. Any server running StorageCenter_5.12.3 or earlier is vulnerable to the complete pre-auth RCE chain.
- Audit internet exposure of the SZC management interface. If
/ConfigService/Admin.aspxis reachable from the public internet, restrict it to known management IP ranges at the firewall or reverse proxy immediately — regardless of patching status. - Review IIS logs on all SZC servers for anomalous POST requests to
/ConfigService/Admin.aspxfrom any unexpected source, going back to at least 10 March. - Inspect the IIS web root and upload directories for unexpected ASPX files. Any unrecognised
.aspxfile warrants immediate investigation and should be treated as a potential webshell. - Audit managed files for signs of exfiltration. Review access logs for the Storage Zone for unusual download activity, particularly of bulk or highly sensitive content.
- Consider a full compromise assessment if your SZC server was unpatched and internet-facing between 10 March and the date of your upgrade.