Hackers Crush IT with CrushFTP: Exploiting Zero-Day Vulnerability!

Hackers are exploiting the CrushFTP zero-day vulnerability, CVE-2025-54309, to gain admin access via HTTPS when the DMZ proxy is off. This bug, already patched in recent versions, has been exploited since July 18. CrushFTP urges users to update to the latest version to avoid falling victim to this flaw.

Pro Dashboard

Hot Take:

CrushFTP’s zero-day vulnerability has hackers dancing like it’s 1999, reversing code and partying in your server’s admin section. Maybe it’s time to update your software before your data ends up on a vacation without you!

Key Points:

  • CrushFTP’s zero-day vulnerability, CVE-2025-54309, is being actively exploited.
  • Attackers gain admin access via HTTPS when the DMZ proxy is off.
  • Vulnerability affects CrushFTP versions before 10.8.5 and 11.3.4_23.
  • Indicators of compromise include unusual entries and fake version numbers.
  • Users are urged to update to the latest patched versions, 11.3.4_26 and 10.8.5_12.

Zero-Day Surprise Party

In a twist worthy of a cyber thriller, hackers have been exploiting a zero-day vulnerability in CrushFTP’s managed file transfer software. Dubbed CVE-2025-54309, this vulnerability is like leaving your server’s front door wide open with a “Welcome, Hackers!” sign. By using HTTPS, attackers have been gaining administrative privileges on unsuspecting servers. This has been happening since July 18, but it’s possible the party started even earlier. The vulnerability was found in versions of CrushFTP prior to the recent updates issued in early July. Seems like it’s high time to RSVP “no” to this surprise party by updating your software!

Reverse Engineering: The Hacker’s Time Machine

Hackers have taken a page out of the “Back to the Future” playbook by reverse engineering old code to exploit a bug that was supposedly patched. It’s like they’re playing a game of “Find the Bug,” and unfortunately, they found it. Using this golden oldie, they’ve been able to exploit servers with the DMZ proxy turned off. CrushFTP warned users about this déjà vu vulnerability, urging them to upgrade to the latest versions immediately. Consider this your DeLorean moment to travel back in time and fix those security holes before it’s too late!

Signs of Hackers: More Visible than Waldo

If your server has been compromised, there are a few telltale signs more obvious than a neon hacker billboard. Look for unusual entries like “last_logins” in the user.XML file, unknown admin users popping up like unwanted houseguests, and long random usernames that make no sense. Missing WebInterface buttons and fake version numbers are like the giant red flags of an attack. If you notice any of these, it’s time to roll up your sleeves and get to work verifying MD5 hashes via the “About” tab for any tampering or injected code. Remember, if it quacks like a duck and hacks like a hacker, it’s probably a hacker!

Backups and Band-Aids

For those unfortunate enough to have been caught in this cyber crossfire, there’s a silver lining. Restore a backup of the default user from before July 18 using CrushFTP’s backup features. You can use tools like 7Zip to extract the backup—or if you’re feeling particularly daring, delete the default user and let CrushFTP recreate it (sans custom settings). Reviewing transfer logs for any suspicious activity is a must, as attackers have been recycling old scripts like they’re eco-friendly. The safest bet? Restore your server state to July 16 and pretend the hacker fiesta never happened!

Patch, Pray, and Repeat

CrushFTP has released patched versions 11.3.4_26 and 10.8.5_12, effectively closing the door on this vulnerability. The company strongly urges all users to update to these versions to avoid having their servers turned into an all-you-can-hack buffet. Staying current on updates is crucial to maintaining security. So, patch up those systems, cross your fingers that the hackers haven’t left any surprises behind, and prepare for the next inevitable cybersecurity hiccup. After all, in the world of cybersecurity, the only thing constant is change—and the relentless creativity of hackers!

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?