Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Exploited CrushFTP Zero-Day Provides Admin Access to Servers

Posted on July 21, 2025July 21, 2025 By CWS

CrushFTP over the weekend warned that hackers have been exploiting a zero-day vulnerability in its managed file switch software program to realize administrative entry to weak servers.

Tracked as CVE-2025-54309 (CVSS rating of 9.0), the flaw is described because the mishandling of AS2 validation when the DMZ proxy characteristic just isn’t used, which permits distant attackers to acquire administrative privileges over HTTPS.

In response to CrushFTP, the safety defect exists in builds launched previous to July 1, and was patched in current releases of the software program, albeit the assault vector was not addressed.

“The assault vector was HTTP(S) for the way they may exploit the server. We had mounted a distinct concern associated to AS2 in HTTP(S) not realizing that the prior bug may very well be used like this exploit was,” CrushFTP notes in its advisory.

The agency believes that menace actors probably reverse-engineered its code and found they may exploit the bug in opposition to unpatched situations.

“Hackers apparently noticed our code change, and found out a technique to exploit the prior bug,” CrushFTP says.

In response to the corporate, solely situations that aren’t utilizing a DMZ in entrance of the appliance are prone to exploitation.

CrushFTP says it first noticed in-the-wild assaults on the morning of July 18, however the exploitation may need began earlier. CrushFTP variations 10 previous to 10.8.5 and variations 11 previous to 11.3.4_23 are impacted. Patches had been included in CrushFTP variations 10.8.5_12 and 11.3.4_26.Commercial. Scroll to proceed studying.

Indicators of compromise (IoCs) embrace the presence of ‘last_logins’ entries within the default person’s XML file, a modified timestamp for the file, administrative entry for the default person, the presence of lengthy random userIDs, the existence of recent usernames with admin entry, the disappearance of buttons from the end-user net interface, and an admin button for normal customers.

Moreover, the corporate explains that attackers have been noticed modifying the software program’s model to provide a false sense of safety, encouraging directors to verify the MD5 hashes for potential tampering.

Directors ought to restore a default person from earlier backups, or just delete the default person, albeit that might additionally erase prior customizations to it.

“Overview add/obtain studies for something transferred. Hackers re-used scripts from prior exploits to deploy issues on CrushFTP servers. We advocate restoring the July sixteenth time-period simply to keep away from something that may have been accomplished. Whereas we noticed the main bulk of exploits within the morning of July 18th, the precise exploits might have been occurring a day earlier whereas directors had been asleep,” CrushFTP notes.

Directors are additionally suggested to implement IP limits for administrative accounts, filter IPs allowed to connect with the server, use a DMZ CrushFTP occasion in entrance of the file switch instrument, and allow computerized updates to all the time keep on the most recent software launch.

Associated: Over 1,400 CrushFTP Situations Weak to Exploited Zero-Day

Associated: CrushFTP Patches Exploited Zero-Day Vulnerability

Associated: SharePoint Below Assault: Microsoft Warns of Zero-Day Exploited within the Wild – No Patch Out there

Associated: Grafana Patches Chromium Bugs, Together with Zero-Day Exploited within the Wild

Security Week News Tags:Access, Admin, CrushFTP, Exploited, Servers, ZeroDay

Post navigation

Previous Post: Microsoft Released an Emergency Security Update to Patch a Critical SharePoint 0-Day Vulnerability
Next Post: Microsoft Patches ‘ToolShell’ Zero-Days Exploited to Hack SharePoint Servers

Related Posts

Northwest Radiologists Data Breach Impacts 350,000 Washingtonians Security Week News
Code Execution Vulnerabilities Patched in Veeam, BeyondTrust Products Security Week News
Industry Reactions to Trump Cybersecurity Executive Order: Feedback Friday Security Week News
Virtual Event Preview: Cloud & Data Security Summit – Tackling Exposed Attack Surfaces in the Cloud Security Week News
Exploited Vulnerability Impacts Over 80,000 Roundcube Servers Security Week News
China’s Salt Typhoon Hacked US National Guard Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 160,000 Impacted by Wayne Memorial Hospital Data Breach
  • Chinese Salt Typhoon and UNC4841 Hackers Teamed Up to Attack Government and Corporate Infrastructure
  • [Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them
  • Threat Actor Connected to Play, RansomHub and DragonForce Ransomware Operations
  • New Malware Campaigns Highlight Rising AI and Phishing Risks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 160,000 Impacted by Wayne Memorial Hospital Data Breach
  • Chinese Salt Typhoon and UNC4841 Hackers Teamed Up to Attack Government and Corporate Infrastructure
  • [Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them
  • Threat Actor Connected to Play, RansomHub and DragonForce Ransomware Operations
  • New Malware Campaigns Highlight Rising AI and Phishing Risks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News