{"id":30276,"date":"2025-03-27T10:24:01","date_gmt":"2025-03-27T10:24:01","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=30276"},"modified":"2025-03-27T10:24:01","modified_gmt":"2025-03-27T10:24:01","slug":"crushftps-unauthenticated-access-flaw","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/crushftps-unauthenticated-access-flaw\/","title":{"rendered":"CrushFTP&#8217;s Unauthenticated Access Flaw Discovered"},"content":{"rendered":"<p><strong>CrushFTP has warned users to patch an unauthenticated access flaw immediately<\/strong>, affecting all v11 versions. The vulnerability enables attackers to gain unauthorized access to unpatched CrushFTP v11 servers, particularly those with exposed HTTP(S) ports.<\/p>\n<h2>CrushFTP&#8217;s Unauthenticated Access Flaw Warning<\/h2>\n<p>CrushFTP, a widely used file transfer protocol server, has recently issued a critical warning to its users, urging them to patch an unauthenticated access flaw immediately. This warning addresses a significant <a href=\"https:\/\/gridinsoft.com\/vulnerability\">security vulnerability<\/a> that affects all versions of v11, with potential implications for v10 as well.<\/p>\n<p>On March 21, 2025, the company emailed customers, warning of an unauthenticated HTTP(S) port access vulnerability. The email emphasized the urgency, stating, &#8220;Please take immediate action to patch ASAP. A vulnerability has been addressed today (March 21st, 2025). All CrushFTP v11 versions were affected. (No earlier versions are affected.) A CVE will be generated soon.&#8221;<\/p>\n<h2>CrushFTP Flaw Description<\/h2>\n<p>The vulnerability is described as an unauthenticated HTTP(S) port access flaw. This means <strong>attackers can potentially gain access to unpatched servers without authentication<\/strong> if the HTTP(S) port is exposed on the internet. This is particularly dangerous for servers accessible online, as it could lead to unauthorized access, data exfiltration, or further exploitation. The bottom line of this vulnerability is that an exposed HTTP(S) port could lead to unauthenticated access.<\/p>\n<p>The severity is underscored by the potential for ransomware and other adversaries to target file transfer technologies. This vulnerability is especially concerning given historical exploitation of similar flaws in CrushFTP, such as the 2024 zero-day (<a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-4040\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2024-4040<\/a>), which allowed complete server compromise.<\/p>\n<p>It will hapdly be different this time, especially considering the availability of the PoC exploit on GitHub. It was posted merely hours after the original disclosure from the developers, and will surely act as an additional push for this flaw exploitation.<\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/crushftp-poc.png\" alt=\"CrushFTP PoC\" width=\"1083\" height=\"627\" class=\"aligncenter size-full wp-image-30294\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/crushftp-poc.png 1083w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/crushftp-poc-300x174.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/crushftp-poc-1024x593.png 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/crushftp-poc-768x445.png 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/crushftp-poc-860x498.png 860w\" sizes=\"auto, (max-width: 1083px) 100vw, 1083px\" \/><\/p>\n<h2>Mitigation and Patch Details<\/h2>\n<p>To address this flaw, <a href=\"https:\/\/www.crushftp.com\/crush11wiki\/Wiki.jsp?page=Update\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CrushFTP released version 11.3.1<\/a>. The change log, accessible via version history, mentions an &#8220;Authentication fix&#8221; for v11.3.1. Users are urged to update immediately, without waiting for regular patch cycles.<\/p>\n<p>An important mitigation strategy is the use of the DMZ feature. This is particularly relevant for users with exposed servers, as it reduces the attack surface. For users still on older versions, the update process involves <strong>downloading the latest version<\/strong> from CrushFTP download, with options for Java21 and without Java17, ensuring compatibility across platforms.<\/p>\n<p>The email notification explicitly states that no earlier versions than v11 are affected, focusing solely on v11. However, the advisory&#8217;s mention of v10 in some sources, introduces uncertainty. Given the lack of specific patch information for v10 in the recent updates, it seems that the focus is on v11. So, v10 users need to ensure they are on the latest patch for previous vulnerabilities, such as those addressed in v10.7.1 and v11.1.0 for CVE-2024-4040.<\/p>\n<figure id=\"attachment_30282\" aria-describedby=\"caption-attachment-30282\" style=\"width: 2531px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/minor_update.webp\" alt=\"CrushFTP updates page\" width=\"2531\" height=\"1172\" class=\"size-full wp-image-30282\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/minor_update.webp 2531w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/minor_update-300x139.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/minor_update-1024x474.webp 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/minor_update-768x356.webp 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/minor_update-1536x711.webp 1536w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/minor_update-2048x948.webp 2048w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/minor_update-860x398.webp 860w\" sizes=\"auto, (max-width: 2531px) 100vw, 2531px\" \/><figcaption id=\"caption-attachment-30282\" class=\"wp-caption-text\">CrushFTP updates<\/figcaption><\/figure>\n<p>Users should prioritize updating to v11.3.1, ensuring their servers are not exposed to the internet without the DMZ feature. For those unsure of their version, checking the dashboard on the CrushFTP website and following the upgrade guide is recommended.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CrushFTP has warned users to patch an unauthenticated access flaw immediately, affecting all v11 versions. The vulnerability enables attackers to gain unauthorized access to unpatched CrushFTP v11 servers, particularly those with exposed HTTP(S) ports. CrushFTP&#8217;s Unauthenticated Access Flaw Warning CrushFTP, a widely used file transfer protocol server, has recently issued a critical warning to its [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":30286,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[619,315,374],"class_list":{"0":"post-30276","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-cybersecurity","9":"tag-exploit","10":"tag-vulnerability"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/GS_Blog_CrushFTP-Warns-of-Critical-Unauthenticated-Access-Flaw-\u2014-Patch-Immediately-_1280x674.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/30276","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=30276"}],"version-history":[{"count":9,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/30276\/revisions"}],"predecessor-version":[{"id":30290,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/30276\/revisions\/30290"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/30286"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=30276"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=30276"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=30276"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}