Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks

Cyber Security

Products You May Like

Apr 20, 2024NewsroomVulnerability / Endpoint Security

Users of the CrushFTP enterprise file transfer software are being urged to update to the latest version following the discovery of a security flaw that has come under targeted exploitation in the wild.

“CrushFTP v11 versions below 11.1 have a vulnerability where users can escape their VFS and download system files,” CrushFTP said in an advisory released Friday. “This has been patched in v11.1.0.”

That said, customers who are operating their CrushFTP instances within a DMZ (demilitarized zone) restricted environment are protected against the attacks.

Cybersecurity

Simon Garrelou of Airbus CERT has been credited with discovering and reporting the flaw. It has yet to be assigned a CVE identifier.

Cybersecurity company CrowdStrike, in a post shared on Reddit, said it has observed an exploit for the flaw being used in the wild in a “targeted fashion.”

CrushFTP Zero-Day Flaw

These intrusions are said to have mainly targeted U.S. entities, with the intelligence gathering activity suspected to be politically motivated.

“CrushFTP users should continue to follow the vendor’s website for the most up-to-date instructions and prioritize patching,” CrowdStrike said.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

Products You May Like

Articles You May Like

Infinix Hot 50 5G India Launch Date Set for September 5; Design, Key Features Revealed Ahead of Debut
ISRO Chief S Somanath Expects Budget Requirement to Grow by Up to 30 Percent in Coming Years
Nvidia’s Forecast Dampens AI Enthusiasm in Other Tech Stocks
Apple Cuts Jobs in Online Services Group as Priorities Shift
Realme GT 7 Pro Launch Timeline Tipped; Key Features Surface Online Again

Leave a Reply

Your email address will not be published. Required fields are marked *