Globalscape Terms Patched ((exclusive)) May 2026
The baseline version required to fix the major 2023 vulnerabilities discovered by Rapid7. How to Check and Patch Your System
An out-of-bounds memory read flaw that allows attackers to potentially bypass authentication or crash the service. In certain scenarios, this could lead to full system takeover.
Keeping Globalscape EFT (Enhanced File Transfer) patched is a critical security requirement for any enterprise handling sensitive data. Failing to apply security updates can leave your administration server exposed to critical flaws like authentication bypasses and remote code execution (RCE). Why "Globalscape Patched" Status Matters globalscape terms patched
A Denial of Service (DoS) vulnerability involving "recursive compression." Attackers can send a specially crafted packet that causes the server to crash by exhausting its stack memory.
Check your current build in the Globalscape Administrator GUI or the EFT Product Downloads page . The baseline version required to fix the major
Recent security audits by organizations like Rapid7 have uncovered several high-impact vulnerabilities in the Globalscape administration server. If your system is not running at least version , it may be vulnerable to the following:
Versions earlier than 8.0.x are largely End of Life (EOL) and no longer receive security updates. Keeping Globalscape EFT (Enhanced File Transfer) patched is
Released March 4, 2026, for organizations remaining on the 8.2 branch.
Follow the direct Upgrade Paths recommended by Globalscape. For example, older 7.x versions must typically upgrade to 8.0.2 before they can reach the latest 8.3 builds.
Older versions may transmit administrator passwords over the network using weak, hard-coded encryption keys, making them recoverable via packet capture. Latest Patched Versions (as of May 2026)

