Skip to content

Exploitation of CrushFTP Vulnerability Occurs After Disclosure of Flaws

Active exploitation of a critical authentication bypass vulnerability in CrushFTP arises due to a faulty disclosure procedure

FTP service CrushFTP compromised after exposure of vulnerabilities
FTP service CrushFTP compromised after exposure of vulnerabilities

Exploitation of CrushFTP Vulnerability Occurs After Disclosure of Flaws

In a recent security advisory, CrushFTP has warned users about an actively exploited critical authentication bypass vulnerability, identified as CVE-2025-31161. This vulnerability, discovered by security analysts at Outpost24, has a CVSSv3.1 severity score of 9.8, making it especially dangerous.

The vulnerability is found in the AWS4-HMAC authentication method of the HTTP component in CrushFTP versions 10 and 11. It allows unauthenticated access to devices running unpatched versions of CrushFTP, potentially enabling unauthorized access.

Many administrators use the default 'crushadmin' username, making the vulnerability even more concerning. Attackers can authenticate as any user, including administrators, by sending a manipulated Authorization header and a malformed request, enabling persistent access.

CrushFTP has released patches for the vulnerability and urges users to update to versions 10.8.4 or 11.3.1 immediately. As a temporary mitigation for those unable to apply the fix immediately, enabling the DMZ perimeter network option is recommended.

Organizations should also monitor system logs for unusual authentication attempts and restrict public-facing access to CrushFTP servers where possible.

It's worth noting that over 1500 vulnerable instances of CrushFTP have been identified online by the Shadowserver Foundation. The flaw was secured on March 13, 2025, and Outpost24 coordinated with CrushFTP under a 90-day non-disclosure period to ensure users had sufficient time to patch.

However, another company, VulnCheck, published a separate CVE - CVE-2025-2825 - without consulting Outpost24 or CrushFTP, disrupting the disclosure process. The company that published VulnCheck-CVE-2025-2825 was VulnCheck.

The ongoing exploitation of CVE-2025-31161 underscores the importance of securing file transfer infrastructure against future vulnerabilities. By taking immediate action and following the recommended mitigations, users can help protect their systems from this critical vulnerability.

Read also:

Latest