Skip to main content

Progress Releases Security Updates for ShareFile Storage Zones Controller (SZC)

Successful exploitation could allow an unauthenticated remote attacker to access on-prem storage zones controller’s configuration pages, potentially leading to changes in system configuration and remote code execution

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Successful exploitation could allow an unauthenticated remote attacker to access on-prem storage zones controller’s configuration pages, potentially leading to changes in system configuration and remote code execution


Affected platforms

The following platforms are known to be affected:

Threat details

Proof-of-Concept Exploit

proof-of-concept exploit for CVE-2026-2701 and CVE-2026-2699 is publicly available. The NHS England National CSOC assesses exploitation as highly likely.


Introduction

Progress has released a security update to address two critical vulnerabilities in ShareFile Storage Zones Controller (SZC). Progress ShareFile was formerly known as Citrix ShareFile.

  • CVE-2026-2699 - 'Execution After Redirect' vulnerability -  CVSSv3 score: 9.8. 
  • CVE-2026-2701 - 'Remote Code Execution' vulnerability -  CVSSv3 score: 9.1. 

When CVE-2026-2699 and CVE-2026-2701 are chained together, an unauthenticated attacker could perform remote code execution (RCE). 


Remediation advice

Affected organisations are encouraged to review Progress ShareFile's security advisory and apply the relevant updates as soon as possible.



Last edited: 7 April 2026 4:03 pm