Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

Malware injected into 6 npm package after maintainer token was stolen in a phishing attack

Hackers exploit critical CrushFTP flaws to gain admin access on unearned servers

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers exploit critical CrushFTP flaws to gain admin access on unearned servers
Identity

Hackers exploit critical CrushFTP flaws to gain admin access on unearned servers

userBy userJuly 20, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 20, 2025Ravi LakshmananVulnerability/Threat Intelligence

Crushftp’s newly disclosed critical security flaws are subject to aggressive exploitation in the wild. CVE identifier CVE-2025-54309 is assigned, and the vulnerability has a CVSS score of 9.0.

“If the DMZ proxy feature is not used, 10.8.5 and 11.3.4_23 and 10.8.5 and 11 before 11.8.5 and 11 before 11.3.4_23 and 11 before 11.3.4_23 would misunderstand AS2 verification, which will allow remote attackers to gain administrator access via HTTP,” according to NIST’s National Ulnerability Database (NVD) vulnerability description.

crushftp said in its recommendation it first detected zero-day exploitation of wild vulnerability at 9am on July 18, 2025, but admitted that it could have been weaponized much earlier.

Cybersecurity

“The attack vector was HTTP about how we could leverage our servers,” the company said. “We fixed another issue related to AS2 in HTTP (S) (S) didn’t realize that previous bugs could be used like this exploit. The hackers obviously saw the code changes and found a way to exploit the previous bug.”

CrushFTP is widely used in government, healthcare and corporate environments to manage sensitive file transfers. A compromised instance allows an attacker to remove data, inject backdoors, or pivot into an internal system that relies on the server for a reliable exchange. Without DMZ isolation, the exposed instance becomes a single point of failure.

The company said an unknown threat actor behind the malicious activity managed to reverse engineer the source code and discovered a new flaw in the target device that has not yet been updated to the latest version. CVE-2025-54309 is believed to have existed in the crushFTP build prior to July 1st.

CrushFTP has also released the Next Indicator for Compromise (IOCS) –

The default user has accessed a long random user IDS created by an administrator (for example, 7A0D26089AC528941BF8CB998D97F408M).

Security teams investigating potential compromises should check user.xml changes time, correlate admin login events with public IP, and check for changes to audit permissions on high-value folders. Look for suspicious patterns in the access logs related to newly created user or unexplained administrator role escalation. Typical indications of post-extracted behavior in real-world violation scenarios.

As a mitigation, the company recommends that users restore previous default users from the backup folder and review the upload/download of reports for suspicious transfer signs. Other steps –

Restrict IP addresses used for management actions AllowList IPS IPS IPS IPS CrushFTP Server switch to connect to the DMZ CrushFTP instance to ensure automatic updates are enabled

Cybersecurity

At this stage, the exact nature of the attack that exploits the flaws is unknown. At the beginning of April this year, another security flaw in the same solution (CVE-2025-31161, CVSS score: 9.8) was weaponized to provide Mesh Central Agents and other malware.

It was also revealed last year that the second important vulnerability affecting CrushFTP (CVE-2024-4040, CVSS score: 9.8) was exploited by threat actors by targeting multiple US entities.

With multiple high-intensity CVEs being exploited over the past year, CrushFTP has emerged as a recurring target in advanced threat campaigns. Organizations should view this pattern as part of a broader threat exposure assessment, along with zero-day detection workflows that include patch rhythms, third-party file transfer risks, and remote access tools and credential compromises.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAstronomer CEO resigns following Cold Play Concert Scandal
Next Article Malware injected into 6 npm package after maintainer token was stolen in a phishing attack
user
  • Website

Related Posts

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

July 20, 2025

Malware injected into 6 npm package after maintainer token was stolen in a phishing attack

July 20, 2025

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

July 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

Malware injected into 6 npm package after maintainer token was stolen in a phishing attack

Hackers exploit critical CrushFTP flaws to gain admin access on unearned servers

Astronomer CEO resigns following Cold Play Concert Scandal

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.