CrushFTP Chaos: 10,000 Vulnerable Servers Under Attack – Update Now!
A critical flaw in CrushFTP affects at least 10,000 instances, allowing attackers to gain admin access via HTTPS. Known as CVE-2025-54309, the vulnerability exploits mishandled AS2 validation when the DMZ proxy feature isn’t used. Experts urge immediate software updates, with the US, Germany, and Canada topping the list of affected countries.

Hot Take:
In a world where everything’s going digital, it’s comforting to know that even our file transfers have vulnerabilities to keep things spicy. It seems like CrushFTP’s developers are giving us an unintentional lesson in the art of “How to Lose Friends and Alienate Data”. Hopefully, they’ll patch things up before it evolves into a dystopian saga of misplaced files and crushed dreams.
Key Points:
– CVE-2025-54309 is wreaking havoc on CrushFTP servers, with remote attackers eyeing admin access like it’s the last slice of pizza.
– The vulnerability resides in mishandling AS2 validation, affecting all CrushFTP versions before 10.8.5 and 11.3.4_23.
– CrushFTP claims that systems using a DMZ proxy are safe; meanwhile, Rapid7 suggests otherwise — someone’s pants might be on fire.
– Over 1,000 unpatched CrushFTP instances are out there, mostly in the US, Germany, and Canada, just waiting to become data-doom day stories.
– The rush is on to update to CrushFTP 11.3.4_26 and 10.8.5_12 to avoid being the next victim of this cyber soap opera.