Monday, September 15, 2025
Google search engine
HomeTechnologyCyber SecurityOver 1,000 CrushFTP servers uncovered to ongoing hijack assaults

Over 1,000 CrushFTP servers uncovered to ongoing hijack assaults


Over 1,000 CrushFTP cases presently uncovered on-line are susceptible to hijack assaults that exploit a essential safety bug, offering admin entry to the online interface.

The safety vulnerability (CVE-2025-54309) is because of mishandled AS2 validation and impacts all CrushFTP variations under 10.8.5 and 11.3.4_23. The seller tagged the flaw as actively exploited within the wild on July nineteenth, noting that assaults might have begun earlier, though it has but to seek out proof to verify this.

“July 18th, 9AM CST there’s a 0-day exploit seen within the wild. Presumably it has been happening for longer, however we noticed it then. Hackers apparently reverse engineered our code and located some bug which we had already fastened,” reads CrushFTP’s advisory

“They’re exploiting it for anybody who has not stayed present on new variations. As at all times we suggest commonly and frequent patching. Anybody who had stored updated was spared from this exploit.”

Nevertheless, CrushFTP added final week that servers which have been stored updated will not be susceptible to assaults, stating that prospects who use a demilitarized zone (DMZ) occasion to isolate their most important server aren’t impacted by this vulnerability.

The corporate additionally recommends reviewing add and obtain logs for uncommon exercise, in addition to enabling automated updates and whitelisting IPs for server and admin entry to additional mitigate exploitation makes an attempt.

In response to scans from the safety menace monitoring platform Shadowserver, roughly 1,040 CrushFTP cases stay unpatched towards CVE-2025-54309 and are susceptible to assaults.

Unpatched CrushFTP serversUnpatched CrushFTP servers (Shadowserver)

ShadowServer is now notifying CrushFTP prospects that their servers are unprotected towards ongoing CVE-2025-54309 exploitation, exposing their contents to information theft makes an attempt.

Whereas it is unclear if these ongoing assaults deploy malware or had been used for information theft, managed file switch options like CrushFTP have been high-value targets for ransomware gangs in recent times.

As an illustration, the Clop cybercrime gang alone has been linked to a number of information theft campaigns concentrating on zero-day flaws in Accelion FTA, ​​​​​GoAnywhere MFT, MOVEit Switch, and, most not too long ago, Cleo software program.

One 12 months in the past, in April 2024, CrushFTP additionally patched an actively exploited zero-day (tracked as CVE-2024-4040) that allowed unauthenticated attackers to flee the person’s digital file system (VFS) and obtain system information.

On the time, the cybersecurity firm CrowdStrike discovered proof that the assaults, which focused CrushFTP cases at a number of U.S. organizations and centered on intelligence gathering, had been probably politically motivated.


Wiz

Include rising threats in actual time – earlier than they affect what you are promoting.

Learn the way cloud detection and response (CDR) provides safety groups the sting they want on this sensible, no-nonsense information.

Get the Information



Supply hyperlink

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments