Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New CrushFTP 0-Day Vulnerability Exploited in the Wild to Gain Access to Servers

Posted on July 19, 2025July 19, 2025 By CWS

A important zero-day flaw within the CrushFTP managed file-transfer platform was confirmed after vendor and threat-intelligence sources confirmed lively exploitation starting on 18 July 2025 at 09:00 CST.

Tracked as CVE-2025-54309, the bug permits unauthenticated attackers to acquire full administrative management of weak servers over HTTPS.

CrushFTP says the problem was inadvertently resolved in builds launched round 1 July, however 1000’s of organisations that delayed updating at the moment are potential targets.

CrushFTP 0-Day Vulnerability Exploited

CrushFTP engineers linked the breach to incomplete validation logic added whereas fixing an unrelated AS2 bug earlier this summer season. After reviewing the July code-diff, attackers reverse-engineered the change and found a approach to route malicious HTTP(S) requests across the meant controls.

When the DMZ proxy characteristic shouldn’t be deployed, the exploit grants the intruder administrator privileges, successfully a “God-mode” session from which they will create new customers, siphon information, or transfer laterally inside company networks.

Rapid7 and Tenable fee the flaw 9.0+ on the CVSS v3.1 scale resulting from its community vector, zero-click nature, and potential for full host compromise.

Shadowserver honeypots started recording exploitation makes an attempt inside hours of the CrushFTP disclosure, echoing earlier mass-scanning waves that adopted the 2025 springtime CVE-2025-31161 authentication bypass.

Impacted Variations

Product branchSafe construct or newerStatus earlier than patchNotesCrushFTP 1111.3.4_2311.3.4_26 is present “fast-fix” roll-upCrushFTP 1010.8.510.8.5_12 launched 18 July

Installations fronted by a correctly configured CrushFTP DMZ occasion are believed to dam the exploit path, however Rapid7 cautions in opposition to relying solely on that structure as a long-term defence.

Indicators of Compromise

Directors ought to instantly examine:

customers/MainUsers/default/person.XML – presence of sudden stanza or current timestamp.

New high-entropy usernames (e.g., 7a0d26089ac528941bf8cb998d97f408m) with admin privileges.

Lacking UI components within the end-user portal or sudden look of an “Admin” button on unusual accounts.

Uncommon outbound site visitors patterns indicating information staging.

Logs point out that attackers are recycling scripts from earlier CrushFTP campaigns, concentrating on fast person creation adopted by bulk file downloads or distant shell drops.

Patch now – improve to 11.3.4_23 / 10.8.5 or later; allow computerized updates for future releases.

Restore defaults – if compromise is suspected, revert default person from a backup dated earlier than 16 July and purge rogue accounts.

Audit transfers – assessment add/obtain stories between 16–18 July for suspicious exercise.

Harden entry – limit admin and WebInterface IP ranges, implement MFA and HTTPS-only, and deploy a DMZ proxy the place possible.

Monitor – subscribe to vendor and CERT advisories; leverage IDS signatures launched by Rapid7 and Tenable for CVE-2025-54309 site visitors.

CVE-2025-54309 is CrushFTP’s third high-impact zero-day in 15 months, following the VFS sandbox escape (CVE-2024-4040) and the AWS4-HMAC race-condition bypass (CVE-2025-31161).

The parade of flaws echoes previous supply-chain breaches involving MOVEit, GoAnywhere MFT, and Accellion FTA, underscoring the strategic worth of file-transfer providers to ransomware teams and espionage actors.

Shodan indices reveal greater than 5,000 CrushFTP cases on-line; earlier 2024 information confirmed at the very least 1,400 remained unpatched weeks after a important advisory.

With public proof-of-concept exploits prone to floor, analysts warn that opportunistic mass exploitation might spike within the coming days.

CrushFTP’s fast launch of construct 11.3.4_26 mitigates the fast menace, however enterprises that deal with file-transfer home equipment as “set-and-forget” utilities stay weak. Patch administration, community segmentation, and vigilant log assessment are as soon as once more the highest priorities.

For organisations but to improve, the most secure assumption is breach restore from backups, rotate credentials, and put together for potential incident-response investigations.

Increase detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now 

Cyber Security News Tags:0Day, Access, CrushFTP, Exploited, Gain, Servers, Vulnerability, Wild

Post navigation

Previous Post: New QR Code Attack Via PDFs Evades Detection Systems and Harvest Credentials
Next Post: New Veeam Themed Phishing Attack Using Weaponized Wav File to Attack users

Related Posts

Windows Remote Desktop Gateway UAF Vulnerability Allows Remote Code Execution Cyber Security News
ServiceNow Platform Vulnerability Let Attackers Exfiltrate Sensitive Data Cyber Security News
Pakistani Actors Built 300+ Cracking Websites Used to Deliver Info-Stealer Malware Cyber Security News
10 Best Cyber Attack Maps Cyber Security News
46,000+ Grafana Instances Exposed to Malicious Account Takeover Attacks Cyber Security News
FBI Atlanta Seizes Major Video Game Piracy Websites in International Operation Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chrome 0-Day, VMware Flaws Patched, Fortiweb Hack, Teams Abuse, and More
  • EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware
  • SharePoint Under Attack: Microsoft Warns of Zero-Day Exploited in the Wild – No Patch Available
  • Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations
  • Malware Injected into 6 npm Packages After Maintainer Tokens Stolen in Phishing Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chrome 0-Day, VMware Flaws Patched, Fortiweb Hack, Teams Abuse, and More
  • EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware
  • SharePoint Under Attack: Microsoft Warns of Zero-Day Exploited in the Wild – No Patch Available
  • Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations
  • Malware Injected into 6 npm Packages After Maintainer Tokens Stolen in Phishing Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News