| At line 1 changed one line |
| July 18th there is a 0-day exploit in the wild. |
| !! CVE-2025-54309 |
| July 18th, 9AM CST there is a 0-day exploit seen in the wild. Possibly it has been going on for longer, but we saw it then.\\ |
| At line 3 removed one line |
| Hackers apparently reverse engineered our code and found some bug we had, which we had already fixed, and are exploiting it for anyone who has not stayed up to date. |
| At line 5 changed one line |
| We believe this bug was in builds prior to July 1st time period roughly...we are not fully certain of the exact bug that is being exploited, but it appears the latest versions of CrushFTP already have the issue patched. The attack vector was HTTP(S) for how they could exploit the server. |
| Hackers apparently reverse engineered our code and found some bug which we had already fixed. They are exploiting it for anyone who has not stayed current on new versions. |
| At line 7 changed one line |
| As always we recommend regularly and frequent patching. |
| We believe this bug was in builds prior to July 1st time period roughly...the latest versions of CrushFTP already have the issue patched. The attack vector was HTTP(S) for how they could exploit the server. We had fixed a different issue related to AS2 in HTTP(S) not realizing that prior bug could be used like this exploit was. Hackers apparently saw our code change, and figured out a way to exploit the prior bug. |
| At line 9 changed one line |
| We don't believe people with a DMZ CrushFTP in front of their main are affected by this. |
| As always we recommend regularly and frequent patching. Anyone who had kept up to date was spared from this exploit. |
| At line 11 added 6 lines |
| Enterprise customers with a DMZ CrushFTP in front of their main are not affected by this. |
|
| !!Affected Versions: |
| All version 10 below 10.8.5. This means *ALL* 10.8.5 versions are SAFE! Only versions below 10.8.5...such as 10.8.4, 10.8.3, etc etc...anything below is vulnerable.\\ |
| All version 11 below 11.3.4_23. To simplify we made 11.3.5 so you didn't have to know a build number. This means *ALL* 11.3.5+ versions are safe.\\ |
|
| At line 14 changed one line |
| These zip files cannot be extracted with native windows unzip and need winrar or macos or winzip etc to extract them. |
| These zip files cannot be extracted with native windows unzip and you need 7Zip, winrar or macos or winzip etc to extract them. You can also just delete your default user and CrushFTP will re-create it for you, but you won't have any prior customizations you might have done. |
| At line 24 added 2 lines |
| Review upload/download reports for anything transferred. Hackers re-used scripts from prior exploits to deploy things on CrushFTP servers. We recommend restoring to July 16th time period just to avoid anything that might have been done. While we saw the major bulk of exploits in the morning of July 18th, the actual exploits may have been occuring a day earlier while administrators were asleep.\\ |
|
| At line 21 changed 2 lines |
| Enterprise users use a DMZ Crush instance in front\\ |
| Allow automatic and frequent patching\\ |
| Enterprise users use a [DMZ] CrushFTP instance in front\\ |
| Allow automatic and frequent updating (Preferences, Updates)\\ |
| Go sign up for emergency notifications so you know of issues sooner: [https://www.crushftp.com/support.html]\\ |
| \\ |
| At line 24 removed one line |
|
| At line 26 changed one line |
| Your default user has "last_logins" in it...this would not be normal. |
| Default user has admin access...\\ |
| Long random userid's created you don't recognize...example: 7a0d26089ac528941bf8cb998d97f408m\\ |
| Other usernames recently created with admin access.\\ |
| Buttons from the end-user WebInterface disappeared, and formerly regular user now has Admin button\\ |
|
| Hackers have been making the version display a fake version to give a false sense of security. We provide the validate hashes function on the about tab to compare MD5 hashes and look for extra code they may have installed into CrushFTP. |