CrushFTP Authentication Bypass Exploited in Attacks

CrushFTP Authentication Bypass Exploited in Attacks

TB

Teqani Blogs

Writer at Teqani

April 8, 202514 min min read

CrushFTP Authentication Bypass Under Attack

Attackers are actively exploiting a critical authentication bypass vulnerability in the CrushFTP file transfer software. This vulnerability is being targeted using exploits derived from publicly available proof-of-concept code. This poses a significant security risk to organizations using vulnerable versions of the software. This exploit could allow unauthorized access to sensitive data.

Details of the Vulnerability

The security vulnerability, identified as CVE-2024-4040, allows attackers to bypass authentication and gain unauthorized access to the CrushFTP server. The availability of public proof-of-concept code has made it easier for threat actors to develop and deploy exploits targeting this flaw. The flaw stems from insufficient validation of user-supplied input, leading to the bypass.

Mitigation Steps

Users of CrushFTP are strongly advised to apply the latest security updates immediately. Organizations should also review their network security configurations to ensure proper access controls are in place. Consider the following:

  • Apply the latest CrushFTP security patch.
  • Review and strengthen access control policies.
  • Monitor network traffic for suspicious activity.
TB

Teqani Blogs

Verified
Writer at Teqani

Senior Software Engineer with 10 years of experience

April 8, 2025
Teqani Certified

All blogs are certified by our company and reviewed by our specialists
Issue Number: #950a12d1-1697-45ce-aa2c-f9994b0b74fa