Skip to main content
News Directory 3
  • Home
  • Business
  • Entertainment
  • Health
  • News
  • Sports
  • Tech
  • World
Menu
  • Home
  • Business
  • Entertainment
  • Health
  • News
  • Sports
  • Tech
  • World

CrushFTP Zero-Day Vulnerability Hackers Exploit

July 21, 2025 Lisa Park Tech
News Context
At a glance
Original source: bankinfosecurity.com

CrushFTP Addresses Zero-Day Exploit, ⁢Urges Users to Update and Secure Systems

Table of Contents

  • CrushFTP Addresses Zero-Day Exploit, ⁢Urges Users to Update and Secure Systems
    • Understanding ‌the Zero-Day⁢ Exploit and ⁤its Impact
    • Latest ⁣Patches and⁣ Security Recommendations
    • Past Vulnerabilities and Industry Response

CrushFTP, a widely used file ​transfer ‍protocol (FTP) server software, has recently addressed a critical zero-day vulnerability that⁢ was actively exploited in​ the wild. The company has released patches and‍ is urging all users to update their software immediately to protect ⁤against potential attacks. The‌ vulnerability, which allowed for ‍authentication ⁤bypass, has been a notable concern‌ for security professionals, ⁣especially given its prior exploitation without a proper CVE designation.

Understanding ‌the Zero-Day⁢ Exploit and ⁤its Impact

The zero-day vulnerability, now ⁢tracked as CVE-2025-31161, allowed attackers to bypass authentication mechanisms ⁢within CrushFTP. this means unauthorized individuals could possibly gain access to ‌sensitive data and systems. CrushFTP‍ has stated that⁣ users who have kept ​their software updated with the latest releases were already protected ⁣from this specific flaw.

For users whose software⁣ may⁣ have been compromised, CrushFTP recommends ​restoring⁢ a ‍prior default user from a backup folder created ‍before​ the exploit ​occurred.​ This action ‌is crucial ⁤for regaining control and ​ensuring⁣ the integrity of the‍ system.

Latest ⁣Patches and⁣ Security Recommendations

As of Monday, the latest available versions of‌ CrushFTP are 10.8.5 and 11.3.5. Version 11.3.5, in particular, ​includes “additional username filtering to theoretically avoid⁤ future similar exploit ⁣attacks.” This indicates a proactive approach by CrushFTP to⁢ bolster its defenses against evolving threats.

Beyond⁢ immediate patching, CrushFTP has provided ​several key ​recommendations to enhance ‌security​ and prevent ‍similar attacks in the future:

Limit ​Administrative IP Addresses: Restricting‍ the IP addresses that can⁢ be used to administer ⁢the software significantly reduces ⁢the attack surface. Utilize IP Whitelists: Implementing whitelists to permit only specific​ IP addresses to connect to the server adds another layer of access control.
* Enable Auto-Updates: Configuring the software to auto-update ensures that users are consistently protected with the latest ⁢security ‍patches.

Ryan Emmons,a staff security researcher at Rapid7,echoed the urgency⁤ of upgrading to a patched version. He also advised caution regarding the reliance on‍ a⁤ Demilitarized Zone (DMZ) as a sole mitigation strategy, suggesting that a more complete approach is necessary.

Past Vulnerabilities and Industry Response

This is not the first time ⁢CrushFTP has faced scrutiny ​over security vulnerabilities. Earlier this year, the company experienced⁤ notoriety with an actively exploited authentication bypass vulnerability. The ⁢U.S.Cybersecurity and Infrastructure Security Agency‌ (CISA) subsequently added this vulnerability to‌ its list of known ‍exploited vulnerabilities.

The situation ​surrounding the disclosure of this earlier vulnerability ‍also sparked controversy.When CrushFTP emailed customers ‌on March ​21 urging them to patch,⁢ it did so without assigning a CVE ‌number to the vulnerability. This lack of formal tracking ⁢led to confusion ⁤and debate within ⁣the cybersecurity community.

A researcher from VulnCheck, using ⁣CrushFTP’s own CVE numbering authority, designated​ the‌ flaw ⁤as CVE-2025-2825. This action reportedly led to a ‍strong reaction from CrushFTP CEO Ben Spink,who⁤ contacted the ⁤researcher,threatening reputational damage if the “fake ‌item” was not ‍removed.

Mitre, the organization that⁤ manages the CVE program,‍ ultimately sided with CrushFTP ​in this ‌dispute. However, researchers at cybersecurity firm ⁤Outpost24,⁤ who initially‌ identified ⁣the vulnerability, stated they ​had an agreement with CrushFTP for ⁢a 90-day delay in‌ public disclosure and had⁤ applied ‍for a CVE number with Mitre⁢ on March 13.The ‍ongoing developments ⁢highlight‍ the critical⁢ importance of timely patching, ‍robust security practices, and transparent vulnerability disclosure in ‍the ⁣software industry.​ CrushFTP users are strongly encouraged to implement the recommended security measures to safeguard their systems.

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X

Related

Crush FTP, CrushFTP, cybersecurity, FTS, information security, MFTS

Search:

News Directory 3

ByoDirectory is a comprehensive directory of businesses and services across the United States. Find what you need, when you need it.

Quick Links

  • Disclaimer
  • Terms and Conditions
  • About Us
  • Advertising Policy
  • Contact Us
  • Cookie Policy
  • Editorial Guidelines
  • Privacy Policy

Browse by State

  • Alabama
  • Alaska
  • Arizona
  • Arkansas
  • California
  • Colorado

Connect With Us

© 2026 News Directory 3. All rights reserved.

Privacy Policy Terms of Service