Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Exploited CrushFTP Zero-Day Provides Admin Access to Servers

Posted on July 21, 2025July 21, 2025 By CWS

CrushFTP over the weekend warned that hackers have been exploiting a zero-day vulnerability in its managed file switch software program to realize administrative entry to weak servers.

Tracked as CVE-2025-54309 (CVSS rating of 9.0), the flaw is described because the mishandling of AS2 validation when the DMZ proxy characteristic just isn’t used, which permits distant attackers to acquire administrative privileges over HTTPS.

In response to CrushFTP, the safety defect exists in builds launched previous to July 1, and was patched in current releases of the software program, albeit the assault vector was not addressed.

“The assault vector was HTTP(S) for the way they may exploit the server. We had mounted a distinct concern associated to AS2 in HTTP(S) not realizing that the prior bug may very well be used like this exploit was,” CrushFTP notes in its advisory.

The agency believes that menace actors probably reverse-engineered its code and found they may exploit the bug in opposition to unpatched situations.

“Hackers apparently noticed our code change, and found out a technique to exploit the prior bug,” CrushFTP says.

In response to the corporate, solely situations that aren’t utilizing a DMZ in entrance of the appliance are prone to exploitation.

CrushFTP says it first noticed in-the-wild assaults on the morning of July 18, however the exploitation may need began earlier. CrushFTP variations 10 previous to 10.8.5 and variations 11 previous to 11.3.4_23 are impacted. Patches had been included in CrushFTP variations 10.8.5_12 and 11.3.4_26.Commercial. Scroll to proceed studying.

Indicators of compromise (IoCs) embrace the presence of ‘last_logins’ entries within the default person’s XML file, a modified timestamp for the file, administrative entry for the default person, the presence of lengthy random userIDs, the existence of recent usernames with admin entry, the disappearance of buttons from the end-user net interface, and an admin button for normal customers.

Moreover, the corporate explains that attackers have been noticed modifying the software program’s model to provide a false sense of safety, encouraging directors to verify the MD5 hashes for potential tampering.

Directors ought to restore a default person from earlier backups, or just delete the default person, albeit that might additionally erase prior customizations to it.

“Overview add/obtain studies for something transferred. Hackers re-used scripts from prior exploits to deploy issues on CrushFTP servers. We advocate restoring the July sixteenth time-period simply to keep away from something that may have been accomplished. Whereas we noticed the main bulk of exploits within the morning of July 18th, the precise exploits might have been occurring a day earlier whereas directors had been asleep,” CrushFTP notes.

Directors are additionally suggested to implement IP limits for administrative accounts, filter IPs allowed to connect with the server, use a DMZ CrushFTP occasion in entrance of the file switch instrument, and allow computerized updates to all the time keep on the most recent software launch.

Associated: Over 1,400 CrushFTP Situations Weak to Exploited Zero-Day

Associated: CrushFTP Patches Exploited Zero-Day Vulnerability

Associated: SharePoint Below Assault: Microsoft Warns of Zero-Day Exploited within the Wild – No Patch Out there

Associated: Grafana Patches Chromium Bugs, Together with Zero-Day Exploited within the Wild

Security Week News Tags:Access, Admin, CrushFTP, Exploited, Servers, ZeroDay

Post navigation

Previous Post: Microsoft Released an Emergency Security Update to Patch a Critical SharePoint 0-Day Vulnerability
Next Post: Microsoft Patches ‘ToolShell’ Zero-Days Exploited to Hack SharePoint Servers

Related Posts

Cerby Raises $40 Million for Identity Automation Platform Security Week News
35,000 Solar Power Systems Exposed to Internet Security Week News
Email Protection Startup StrongestLayer Emerges From Stealth Mode Security Week News
Fraud: A Growth Industry Powered by Gen-AI Security Week News
Cambodia Makes 1,000 Arrests in Latest Crackdown on Cybercrime Security Week News
Is AI Use in the Workplace Out of Control? Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Remove Your Data From Data Broker Sites
  • TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands
  • SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups
  • Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems
  • Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Remove Your Data From Data Broker Sites
  • TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands
  • SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups
  • Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems
  • Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News