Article Details

Scrape Timestamp (UTC): 2025-07-20 07:42:33.221

Source: https://thehackernews.com/2025/07/hackers-exploit-critical-crushftp-flaw.html

Original Article Text

Click to Toggle View

Hackers Exploit Critical CrushFTP Flaw to Gain Admin Access on Unpatched Servers. A newly disclosed critical security flaw in CrushFTP has come under active exploitation in the wild. Assigned the CVE identifier CVE-2025-54309, the vulnerability carries a CVSS score of 9.0. "CrushFTP 10 before 10.8.5 and 11 before 11.3.4_23, when the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS," according to a description of the vulnerability in the NIST's National Vulnerability Database (NVD). CrushFTP, in an advisory, said it first detected the zero-day exploitation of the vulnerability in the wild on July 18, 2025, 9 a.m. CST, although it acknowledged that it may have been weaponized much earlier. "The attack vector was HTTP(S) for how they could exploit the server," the company said. "We had fixed a different issue related to AS2 in HTTP(S) not realizing that a prior bug could be used like this exploit was. Hackers apparently saw our code change, and figured out a way to exploit the prior bug." CrushFTP is widely used in government, healthcare, and enterprise environments to manage sensitive file transfers—making administrative access especially dangerous. A compromised instance can allow attackers to exfiltrate data, inject backdoors, or pivot into internal systems that rely on the server for trusted exchange. Without DMZ isolation, the exposed instance becomes a single point of failure. The company said the unknown threat actors behind the malicious activity managed to reverse engineer its source code and discovered the new flaw to target devices that are yet to be updated to the latest versions. It's believed that CVE-2025-54309 was present in CrushFTP builds prior to July 1. CrushFTP has also released the following indicators of compromise (IoCs) - Security teams investigating possible compromise should review user.xml modification times, correlate admin login events with public IPs, and audit permission changes on high-value folders. Look for suspicious patterns in access logs tied to newly created users or unexplained admin role escalations—typical signs of post-exploitation behavior in real-world breach scenarios. As mitigations, the company recommends that users restore a prior default user from the backup folder, as well as review upload/download reports for any signs of suspicious transfers. Other steps include - At this stage, the exact nature of the attacks exploiting the flaw is not known. Earlier this April, another security defect in the same solution (CVE-2025-31161, CVSS score: 9.8) was weaponized to deliver the MeshCentral agent and other malware. Last year, it also emerged that a second critical vulnerability impacting CrushFTP (CVE-2024-4040, CVSS score: 9.8) was leveraged by threat actors to target multiple U.S. entities. With multiple high-severity CVEs exploited over the past year, CrushFTP has emerged as a recurring target in advanced threat campaigns. Organizations should consider this pattern as part of broader threat exposure assessments, alongside patch cadence, third-party file transfer risks, and zero-day detection workflows involving remote access tools and credential compromise.

Daily Brief Summary

CYBERCRIME // Hackers Target Unpatched Servers Via CrushFTP Vulnerability

A critical vulnerability in CrushFTP, CVE-2025-54309, with a CVSS score of 9.0, is being actively exploited to gain administrative access.

The flaw is present in versions CrushFTP 10 prior to 10.8.5 and 11 prior to 11.3.4_23, exploiting the AS2 validation when the DMZ proxy is not utilized.

CrushFTP, widely used in sectors like government, healthcare, and enterprise, acknowledged the zero-day exploitation discovered on July 18, 2025.

Attackers gained access possibly by reverse engineering CrushFTP’s recent code changes and exploiting earlier undetected bugs.

This administrative access permits potential data exfiltration, backdoor insertion, and internal system compromises.

CrushFTP has released indicators of compromise and recommends security measures including checking modification times of user.xml and auditing permission changes.

Previously, other high-severity vulnerabilities in CrushFTP have been exploited, suggesting a pattern of targeted attacks against the platform.

Immediate patching and compliance with CrushFTP's mitigation recommendations are crucial to prevent further exploits.