Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Google’s Veo 3.1 Simply Made AI Filmmaking Sound—and Look—Uncomfortably Actual

    October 17, 2025

    North Korean Hackers Use EtherHiding to Cover Malware Inside Blockchain Good Contracts

    October 16, 2025

    Why the F5 Hack Created an ‘Imminent Menace’ for 1000’s of Networks

    October 16, 2025
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»Hackers Exploit CrushFTP Zero-Day to Take Over Servers
    AI Ethics & Regulation

    Hackers Exploit CrushFTP Zero-Day to Take Over Servers

    Declan MurphyBy Declan MurphyAugust 31, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Hackers Exploit CrushFTP Zero-Day to Take Over Servers
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    WatchTowr Labs uncovers a zero-day exploit (CVE-2025-54309) in CrushFTP. The vulnerability lets hackers acquire admin entry through the net interface. Replace to v10.8.5 or v11.3.4.

    A zero-day vulnerability in CrushFTP, a broadly used file switch server, is being actively exploited by hackers. Cybersecurity agency watchTowr Labs found the lively exploitation of this flaw, tracked as CVE-2025-54309. The vulnerability was added to the CISA Identified Exploited Vulnerabilities Catalogue on July 22, 2025, confirming its vital standing.

    watchTowr Labs’ investigation revealed a vital risk to over 30,000 on-line situations of the software program. In its official assertion, CrushFTP confirmed that the vulnerability had been exploited within the wild as early as July 18, 2025.

    CrushFTP official announcement (Supply: watchTowr Labs)

    The corporate famous that the newest variations of the software program had already fastened the problem. Hackers doubtless found out the way to exploit the bug after the corporate made a current code change to repair a unique downside, unintentionally revealing the vulnerability to attackers.

    “We consider this bug was in builds previous to July 1st time interval, roughly… the newest variations of CrushFTP have already got the problem patched. The assault vector was HTTP(S) for a way they may exploit the server. We had fastened a unique problem associated to AS2 in HTTP(S) not realizing that prior bug may very well be used like this exploit was. Hackers apparently noticed our code change, and found out a technique to exploit the prior bug.” CrushFTP’s assertion.

    The Exploit Defined

    watchTowr Labs used its proprietary honeypot community, known as Attacker Eye, to seize the assault because it occurred. The group deployed a selected sensor for CrushFTP and acquired a direct alert when the sensor was breached.

    Evaluation of the uncooked community site visitors revealed a definite sample: two related HTTP requests have been being despatched in speedy succession, repeated over 1,000 instances. The important thing distinction between the 2 requests was of their headers.

    The primary request contained a header that pointed to the interior administrative person crushadmin, whereas the second request didn’t. This behaviour hinted at a race situation, which happens when two duties are competing for sources, and the end result relies on which one finishes first.

    On this case, the 2 requests have been racing to be processed. If the requests arrived in a really particular order, the second request was capable of reap the benefits of the primary, executing because the crushadmin person with out correct authentication (because the server thinks the attacker is an administrator).

    From there, it’s successfully recreation over as a result of the hacker can bypass authentication after which take full management of the server, retrieve delicate recordsdata, and trigger important harm.

    The assault particularly happens through the software program’s internet interface in variations previous to CrushFTP v10.8.5 and CrushFTP v11.3.4_23. Please observe that enterprise prospects utilizing a DMZ CrushFTP occasion to isolate their principal server will not be believed to be affected.

    To verify their findings, watchTowr Labs created their very own script to copy the assault and efficiently created a brand new administrator account on a weak occasion.

    What You Have to Do

    In line with researchers, the builders of CrushFTP had silently patched this problem in current updates with out publicly warning customers, leaving many in danger. On condition that this vulnerability is being actively exploited, it’s vital to safe your system by updating the software program to the newest patched variations instantly.



    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    North Korean Hackers Use EtherHiding to Cover Malware Inside Blockchain Good Contracts

    October 16, 2025

    North Korean Hackers Deploy BeaverTail–OtterCookie Combo for Keylogging Assaults

    October 16, 2025

    Coming AI rules have IT leaders anxious about hefty compliance fines

    October 16, 2025
    Top Posts

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025

    Meta resumes AI coaching utilizing EU person knowledge

    April 18, 2025
    Don't Miss

    Google’s Veo 3.1 Simply Made AI Filmmaking Sound—and Look—Uncomfortably Actual

    By Amelia Harper JonesOctober 17, 2025

    Google’s newest AI improve, Veo 3.1, is blurring the road between artistic device and film…

    North Korean Hackers Use EtherHiding to Cover Malware Inside Blockchain Good Contracts

    October 16, 2025

    Why the F5 Hack Created an ‘Imminent Menace’ for 1000’s of Networks

    October 16, 2025

    3 Should Hear Podcast Episodes To Assist You Empower Your Management Processes

    October 16, 2025
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2025 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.