Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Exploited CrushFTP Zero-Day Provides Admin Access to Servers

Posted on July 21, 2025July 21, 2025 By CWS

CrushFTP over the weekend warned that hackers have been exploiting a zero-day vulnerability in its managed file switch software program to realize administrative entry to weak servers.

Tracked as CVE-2025-54309 (CVSS rating of 9.0), the flaw is described because the mishandling of AS2 validation when the DMZ proxy characteristic just isn’t used, which permits distant attackers to acquire administrative privileges over HTTPS.

In response to CrushFTP, the safety defect exists in builds launched previous to July 1, and was patched in current releases of the software program, albeit the assault vector was not addressed.

“The assault vector was HTTP(S) for the way they may exploit the server. We had mounted a distinct concern associated to AS2 in HTTP(S) not realizing that the prior bug may very well be used like this exploit was,” CrushFTP notes in its advisory.

The agency believes that menace actors probably reverse-engineered its code and found they may exploit the bug in opposition to unpatched situations.

“Hackers apparently noticed our code change, and found out a technique to exploit the prior bug,” CrushFTP says.

In response to the corporate, solely situations that aren’t utilizing a DMZ in entrance of the appliance are prone to exploitation.

CrushFTP says it first noticed in-the-wild assaults on the morning of July 18, however the exploitation may need began earlier. CrushFTP variations 10 previous to 10.8.5 and variations 11 previous to 11.3.4_23 are impacted. Patches had been included in CrushFTP variations 10.8.5_12 and 11.3.4_26.Commercial. Scroll to proceed studying.

Indicators of compromise (IoCs) embrace the presence of ‘last_logins’ entries within the default person’s XML file, a modified timestamp for the file, administrative entry for the default person, the presence of lengthy random userIDs, the existence of recent usernames with admin entry, the disappearance of buttons from the end-user net interface, and an admin button for normal customers.

Moreover, the corporate explains that attackers have been noticed modifying the software program’s model to provide a false sense of safety, encouraging directors to verify the MD5 hashes for potential tampering.

Directors ought to restore a default person from earlier backups, or just delete the default person, albeit that might additionally erase prior customizations to it.

“Overview add/obtain studies for something transferred. Hackers re-used scripts from prior exploits to deploy issues on CrushFTP servers. We advocate restoring the July sixteenth time-period simply to keep away from something that may have been accomplished. Whereas we noticed the main bulk of exploits within the morning of July 18th, the precise exploits might have been occurring a day earlier whereas directors had been asleep,” CrushFTP notes.

Directors are additionally suggested to implement IP limits for administrative accounts, filter IPs allowed to connect with the server, use a DMZ CrushFTP occasion in entrance of the file switch instrument, and allow computerized updates to all the time keep on the most recent software launch.

Associated: Over 1,400 CrushFTP Situations Weak to Exploited Zero-Day

Associated: CrushFTP Patches Exploited Zero-Day Vulnerability

Associated: SharePoint Below Assault: Microsoft Warns of Zero-Day Exploited within the Wild – No Patch Out there

Associated: Grafana Patches Chromium Bugs, Together with Zero-Day Exploited within the Wild

Security Week News Tags:Access, Admin, CrushFTP, Exploited, Servers, ZeroDay

Post navigation

Previous Post: Microsoft Released an Emergency Security Update to Patch a Critical SharePoint 0-Day Vulnerability
Next Post: Microsoft Patches ‘ToolShell’ Zero-Days Exploited to Hack SharePoint Servers

Related Posts

Russian APT Exploiting 7-Year-Old Cisco Vulnerability: FBI Security Week News
Casie Antalis Named Executive Director of CISA Security Week News
Grok-4 Falls to a Jailbreak Two days After Its Release Security Week News
Gerrit Misconfiguration Exposed Google Projects to Malicious Code Injection Security Week News
Critical OpenPGP.js Vulnerability Allows Spoofing Security Week News
Open Source CISA Tool Helps Defenders With Hacker Containment, Eviction Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 45 Previously Unreported Domains Expose Longstanding Salt Typhoon Cyber Espionage
  • How to Use Incognito Mode Effectively
  • Progress OpenEdge AdminServer Vulnerability Let Attackers Execute Remote Code
  • Windows Defender Vulnerability Allows Service Hijacking and Disablement via Symbolic Link Attack
  • GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 45 Previously Unreported Domains Expose Longstanding Salt Typhoon Cyber Espionage
  • How to Use Incognito Mode Effectively
  • Progress OpenEdge AdminServer Vulnerability Let Attackers Execute Remote Code
  • Windows Defender Vulnerability Allows Service Hijacking and Disablement via Symbolic Link Attack
  • GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News