Article Details

Scrape Timestamp (UTC): 2024-04-20 05:27:28.749

Source: https://thehackernews.com/2024/04/critical-update-crushftp-zero-day-flaw.html

Original Article Text

Click to Toggle View

Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks. Users of the CrushFTP enterprise file transfer software are being urged to update to the latest version following the discovery of a security flaw that has come under targeted exploitation in the wild. "CrushFTP v11 versions below 11.1 have a vulnerability where users can escape their VFS and download system files," CrushFTP said in an advisory released Friday. "This has been patched in v11.1.0." That said, customers who are operating their CrushFTP instances within a DMZ (demilitarized zone) restricted environment are protected against the attacks. Simon Garrelou of Airbus CERT has been credited with discovering and reporting the flaw. It has yet to be assigned a CVE identifier. Cybersecurity company CrowdStrike, in a post shared on Reddit, said it has observed an exploit for the flaw being used in the wild in a "targeted fashion." These intrusions are said to have mainly targeted U.S. entities, with the intelligence gathering activity suspected to be politically motivated. "CrushFTP users should continue to follow the vendor's website for the most up-to-date instructions and prioritize patching," CrowdStrike said. Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with Rewind's daily backups and on-demand restores. How to Update and Automate Outdated Security Processes Download the eBook for step-by-step guidance on how to update your security processes as your business grows.

Daily Brief Summary

CYBERCRIME // CrushFTP Zero-Day Vulnerability Exploited in Targeted Cyber Attacks

CrushFTP enterprise file transfer software discovered a zero-day vulnerability affecting versions below 11.1.

Users are encouraged to update their software to version 11.1.0 where the vulnerability is patched.

The vulnerability allows unauthorized downloading of system files by escaping VFS (Virtual File System).

Customers using CrushFTP in a DMZ (demilitarized zone) setting are reportedly protected from this exploit.

Cybersecurity firm CrowdStrike identified the exploit used in targeted attacks primarily against U.S. entities.

These exploits are suspected to be politically motivated, focusing on intelligence gathering.

The vulnerability has not yet received a CVE identifier, but ongoing updates and patches are recommended.

The vulnerability was disclosed by Simon Garrelou of Airbus CERT.