PT-2025-14099 · Crushftp · Crushftp

Mortem

·

Published

2025-03-13

·

Updated

2025-07-26

·

CVE-2025-31161

CVSS v2.0
10
VectorAV:N/AC:L/Au:N/C:C/I:C/A:C

**Name of the Vulnerable Software and Affected Versions:**

CrushFTP versions 10.0.0 through 10.8.3

CrushFTP versions 11.0.0 through 11.3.0

**Description:**

CrushFTP is affected by an authentication bypass vulnerability that allows attackers to bypass authentication and potentially take over the `crushadmin` account. This vulnerability, exploited in the wild since March 2025, is due to a race condition in the AWS4-HMAC authorization method of the HTTP component. By sending a crafted AWS4-HMAC header with only a username and a trailing slash (/), attackers can bypass authentication and gain administrative access. The vulnerability has been observed being exploited by various threat actors, including the Kill ransomware gang, and has led to the installation of backdoors such as MeshAgent and AnyDesk. Approximately 815 servers were identified as vulnerable, with attacks targeting sectors including marketing, retail, and semiconductors.

**Recommendations:**

CrushFTP versions 10.0.0 through 10.8.3: Upgrade to version 10.8.4 or later.

CrushFTP versions 11.0.0 through 11.3.0: Upgrade to version 11.3.1 or later.

Exploit

Fix

RCE

Weakness Enumeration

Related Identifiers

BDU:2025-03886
CVE-2025-31161

Affected Products

Crushftp