Friday, March 28, 2025

CrushFTP warns customers to patch unauthenticated entry flaw instantly


CrushFTP warned clients of an unauthenticated HTTP(S) port entry vulnerability and urged them to patch their servers instantly.

As the corporate additionally defined in an electronic mail despatched to clients on Friday (seen by BleepingComputer), the safety flaw permits attackers to realize unauthenticated entry to unpatched servers if they’re uncovered on the Web over HTTP(S).

“Please take rapid motion to patch ASAP. A vulnerability has been addressed at present (March twenty first, 2025). All CrushFTP v11 variations have been affected. (No earlier variations are affected.) A CVE shall be generated quickly,” the corporate warned.

“The underside line of this vulnerability is that an uncovered HTTP(S) port may result in unauthenticated entry. The vulnerability is mitigated If in case you have the DMZ characteristic of CrushFTP in place.”

Whereas the e-mail says this vulnerability solely impacts CrushFTP v11 variations, an advisory issued on the identical day says that each CrushFTP v10 and v11 are impacted, as cybersecurity firm Rapid7 first famous.

As a workaround, those that cannot instantly replace CrushFTP v11.3.1+ (which fixes the flaw) can allow the DMZ (demilitarized zone) perimeter community possibility to guard their CrushFTP occasion till safety updates may be deployed.

In line with Shodan, over 3,400 CrushFTP situations have their net interface uncovered on-line to assaults, though BleepingComputer could not decide what number of have already been patched.

Internet exposed CrushFTP instances
Web-exposed CrushFTP situations (Shodan)

​In April 2024, CrushFTP additionally launched safety updates to patch an actively exploited zero-day vulnerability (CVE-2024-4040) that allowed unauthenticated attackers to flee the person’s digital file system (VFS) and obtain system information.

On the time, cybersecurity firm CrowdStrike discovered proof pointing to an intelligence-gathering marketing campaign, doubtless politically motivated, with the attackers concentrating on CrushFTP servers at a number of U.S. organizations.

CISA added CVE-2024-4040 to its Identified Exploited Vulnerabilities catalog, ordering U.S. federal companies to safe weak servers on their networks inside every week.

In November 2023, CrushFTP clients have been additionally warned to patch a crucial distant code execution vulnerability (CVE-2023-43177) within the firm’s enterprise suite after Converge safety researchers who reported the flaw launched a proof-of-concept exploit three months after the flaw was addressed.

File switch merchandise like CrushFTP are engaging targets for ransomware gangs, particularly Clop, which was linked to knowledge theft assaults concentrating on zero-day vulnerabilities in MOVEit Switch, GoAnywhere MFT, Accelion FTA, and Cleo software program.

Primarily based on an evaluation of 14M malicious actions, uncover the highest 10 MITRE ATT&CK methods behind 93% of assaults and how you can defend in opposition to them.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles