Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New CrushFTP 0-Day Vulnerability Exploited in the Wild to Gain Access to Servers

Posted on July 19, 2025July 19, 2025 By CWS

A important zero-day flaw within the CrushFTP managed file-transfer platform was confirmed after vendor and threat-intelligence sources confirmed lively exploitation starting on 18 July 2025 at 09:00 CST.

Tracked as CVE-2025-54309, the bug permits unauthenticated attackers to acquire full administrative management of weak servers over HTTPS.

CrushFTP says the problem was inadvertently resolved in builds launched round 1 July, however 1000’s of organisations that delayed updating at the moment are potential targets.

CrushFTP 0-Day Vulnerability Exploited

CrushFTP engineers linked the breach to incomplete validation logic added whereas fixing an unrelated AS2 bug earlier this summer season. After reviewing the July code-diff, attackers reverse-engineered the change and found a approach to route malicious HTTP(S) requests across the meant controls.

When the DMZ proxy characteristic shouldn’t be deployed, the exploit grants the intruder administrator privileges, successfully a “God-mode” session from which they will create new customers, siphon information, or transfer laterally inside company networks.

Rapid7 and Tenable fee the flaw 9.0+ on the CVSS v3.1 scale resulting from its community vector, zero-click nature, and potential for full host compromise.

Shadowserver honeypots started recording exploitation makes an attempt inside hours of the CrushFTP disclosure, echoing earlier mass-scanning waves that adopted the 2025 springtime CVE-2025-31161 authentication bypass.

Impacted Variations

Product branchSafe construct or newerStatus earlier than patchNotesCrushFTP 1111.3.4_2311.3.4_26 is present “fast-fix” roll-upCrushFTP 1010.8.510.8.5_12 launched 18 July

Installations fronted by a correctly configured CrushFTP DMZ occasion are believed to dam the exploit path, however Rapid7 cautions in opposition to relying solely on that structure as a long-term defence.

Indicators of Compromise

Directors ought to instantly examine:

customers/MainUsers/default/person.XML – presence of sudden stanza or current timestamp.

New high-entropy usernames (e.g., 7a0d26089ac528941bf8cb998d97f408m) with admin privileges.

Lacking UI components within the end-user portal or sudden look of an “Admin” button on unusual accounts.

Uncommon outbound site visitors patterns indicating information staging.

Logs point out that attackers are recycling scripts from earlier CrushFTP campaigns, concentrating on fast person creation adopted by bulk file downloads or distant shell drops.

Patch now – improve to 11.3.4_23 / 10.8.5 or later; allow computerized updates for future releases.

Restore defaults – if compromise is suspected, revert default person from a backup dated earlier than 16 July and purge rogue accounts.

Audit transfers – assessment add/obtain stories between 16–18 July for suspicious exercise.

Harden entry – limit admin and WebInterface IP ranges, implement MFA and HTTPS-only, and deploy a DMZ proxy the place possible.

Monitor – subscribe to vendor and CERT advisories; leverage IDS signatures launched by Rapid7 and Tenable for CVE-2025-54309 site visitors.

CVE-2025-54309 is CrushFTP’s third high-impact zero-day in 15 months, following the VFS sandbox escape (CVE-2024-4040) and the AWS4-HMAC race-condition bypass (CVE-2025-31161).

The parade of flaws echoes previous supply-chain breaches involving MOVEit, GoAnywhere MFT, and Accellion FTA, underscoring the strategic worth of file-transfer providers to ransomware teams and espionage actors.

Shodan indices reveal greater than 5,000 CrushFTP cases on-line; earlier 2024 information confirmed at the very least 1,400 remained unpatched weeks after a important advisory.

With public proof-of-concept exploits prone to floor, analysts warn that opportunistic mass exploitation might spike within the coming days.

CrushFTP’s fast launch of construct 11.3.4_26 mitigates the fast menace, however enterprises that deal with file-transfer home equipment as “set-and-forget” utilities stay weak. Patch administration, community segmentation, and vigilant log assessment are as soon as once more the highest priorities.

For organisations but to improve, the most secure assumption is breach restore from backups, rotate credentials, and put together for potential incident-response investigations.

Increase detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now 

Cyber Security News Tags:0Day, Access, CrushFTP, Exploited, Gain, Servers, Vulnerability, Wild

Post navigation

Previous Post: New QR Code Attack Via PDFs Evades Detection Systems and Harvest Credentials
Next Post: New Veeam Themed Phishing Attack Using Weaponized Wav File to Attack users

Related Posts

Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website Cyber Security News
Sophisticated Malware Campaign Targets WordPress and WooCommerce Sites with Obfuscated Skimmers Cyber Security News
Four Hackers Arrested by UK Police for Attacks on M&S, Co-op and Harrods Stores Cyber Security News
How SOC Teams Reduce MTTD And MTTR With Threat Context Enrichment  Cyber Security News
First Rowhammer Attack Targeting NVIDIA GPUs Cyber Security News
Leeds United And Reflectiz Partner To Share Insights On Proactive Web Security After Cyber Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Snake Keylogger Evades Windows Defender and Scheduled Tasks to Harvest Login Credentials
  • Chinese Threat Actors Using 2,800 Malicious Domains to Deliver Windows-Specific Malware
  • New Veeam Themed Phishing Attack Using Weaponized Wav File to Attack users
  • New CrushFTP 0-Day Vulnerability Exploited in the Wild to Gain Access to Servers
  • New QR Code Attack Via PDFs Evades Detection Systems and Harvest Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Snake Keylogger Evades Windows Defender and Scheduled Tasks to Harvest Login Credentials
  • Chinese Threat Actors Using 2,800 Malicious Domains to Deliver Windows-Specific Malware
  • New Veeam Themed Phishing Attack Using Weaponized Wav File to Attack users
  • New CrushFTP 0-Day Vulnerability Exploited in the Wild to Gain Access to Servers
  • New QR Code Attack Via PDFs Evades Detection Systems and Harvest Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News