Over 1,000 CrushFTP servers exposed to ongoing hijack attacks

Over 1,000 CrushFTP servers exposed to ongoing hijack attacks

Over 1,000 CrushFTP instances currently exposed online are vulnerable to hijack attacks that exploit a critical security bug, providing admin access to the web interface.

The security vulnerability (CVE-2025-54309) is due to mishandled AS2 validation and impacts all CrushFTP versions below 10.8.5 and 11.3.4_23. The vendor tagged the flaw as actively exploited in the wild on July 19th, noting that attacks may have begun earlier, although it has yet to find evidence to confirm this.

“July 18th, 9AM CST there is a 0-day exploit seen in the wild. Possibly it has been going on for longer, but we saw it then. Hackers apparently reverse engineered our code and found some bug which we had already fixed,” reads CrushFTP’s advisory

“They are exploiting it for anyone who has not stayed current on new versions. As always we recommend regularly and frequent patching. Anyone who had kept up to date was spared from this exploit.”

However, CrushFTP added last week that servers that have been kept up to date are not vulnerable to attacks, stating that customers who use a demilitarized zone (DMZ) instance to isolate their main server aren’t impacted by this vulnerability.

The company also recommends reviewing upload and download logs for unusual activity, as well as enabling automatic updates and whitelisting IPs for server and admin access to further mitigate exploitation attempts.

According to scans from the security threat monitoring platform Shadowserver, approximately 1,040 CrushFTP instances remain unpatched against CVE-2025-54309 and are vulnerable to attacks.

Unpatched CrushFTP servers
Unpatched CrushFTP servers (Shadowserver)

ShadowServer is now notifying CrushFTP customers that their servers are unprotected against ongoing CVE-2025-54309 exploitation, exposing their contents to data theft attempts.

While it’s unclear if these ongoing attacks deploy malware or were used for data theft, managed file transfer solutions like CrushFTP have been high-value targets for ransomware gangs in recent years.

For instance, the Clop cybercrime gang alone has been linked to multiple data theft campaigns targeting zero-day flaws in Accelion FTA, ​​​​​GoAnywhere MFT, MOVEit Transfer, and, most recently, Cleo software.

One year ago, in April 2024, CrushFTP also patched an actively exploited zero-day (tracked as CVE-2024-4040that allowed unauthenticated attackers to escape the user’s virtual file system (VFS) and download system files.

At the time, the cybersecurity company CrowdStrike found evidence that the attacks, which targeted CrushFTP instances at multiple U.S. organizations and focused on intelligence gathering, were likely politically motivated.

Wiz

CISOs know that getting board buy-in starts with a clear, strategic view of how cloud security drives business value.

This free, editable board report deck helps security leaders present risk, impact, and priorities in clear business terms. Turn security updates into meaningful conversations and faster decision-making in the boardroom.


Source link