Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Top mobile phones under Rs 15,000 in India (August 2025): Redmi Note 14 SE 5G, Tecno Pova 7, IQoo Z10X, and more

    August 5, 2025

    A top designer was banned from drill. Now he is creating his own contestant.

    August 4, 2025

    Anthropic AI wants to stop the model from evil – how is here

    August 4, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Crushftp zero-day exploited in attacks to obtain administrator access on server
    Security

    Crushftp zero-day exploited in attacks to obtain administrator access on server

    PineapplesUpdateBy PineapplesUpdateJuly 19, 2025No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Crushftp zero-day exploited in attacks to obtain administrator access on server
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Crushftp zero-day exploited in attacks to obtain administrator access on server

    Crushfts are warning that the actor of the danger is actively exploiting a zero-day vulnerability tracked as the CVE-2025-54309, which allows the attackers to achieve administrative access through the web interface on the weak server.

    Crushafp is an enterprise file transfer server that is used by organizations to safely share and manage files on FTP, SFTP, HTTP/S and other protocols.

    According to crushfi, the danger actors were first revealed to exploit vulnerability on CST at 9 am on July 18, although it could begin in the early hours of the previous day.

    CEO of Crushfy Ben Spink told Blapping Computer that he had earlier decided to have a vulnerability related to AS2 in HTTP (on) that inadvertently blocked the blame of zero-day.

    Spink told bleepingcomputer, “Incidentally a pre -fixed was to block this vulnerability, but the former fix was targeting a separate issue and default was rarely shutting down some rarely used facilities.”

    Crushftp says that the danger actors engineered their software and discovered this new bug and started exploiting it on the devices that are not up-to-det on their patch.

    “We believe Crushftp advisor,

    “The attack vector http (s) was how they could exploit the server. We had set a separate issue related to the AS2 in HTTP (s), not realizing that the former bug could be used as this exploitation. Hackers clearly saw our code change, and discovered a way to exploit the pre -bug.

    “As usual we recommend regularly and frequent patching. Anyone who kept till date was spared from this exploitation.”

    The attack occurs through the web interface of the software, which is in versions before crushftp v10.8.5 and crushftp v11.3.4_23. It is not clear when these versions were released, but the crushftp says around 1 July.

    Crushftpie said that the systems that have been updated are not weak.

    Enterprise customers using an DMZ crushfast institute to separate their main servers are not affected by this vulnerability.

    Those administrators believe that their system was compromised, they are advised to restore the default user configuration from a backup before July 16. Indicators of the agreement include:

    • Unphetual entries in mainusers/default/user.xml, especially recent modifications or A last_logins Field
    • New, unfamiliar administrator-level user names such as 7a0d26089ac528941bf8cb998d97f408m,

    Spink says that they are most defaulted as the main IOC to the default user.

    Spink told BlappingCompter, “In general we have modified the default user as the main IOC. In general, in a very invalid ways have been modified in very invalid ways that were still useable for the attacker, but no one else,” Spink told the BlappingCompter.

    Recommend the following stages to review the crushfastpie uploads and to download logs for abnormal activity and reduce exploitation:

    • IP VITISTING for Server and Administrator Access
    • Using a dmz example
    • Enable automatic update

    However, cyber security firm Rapid 7 says that DMZ’s use may not be a reliable strategy to prevent exploitation.

    “From an abundance of caution, Rapid 7 advises against relying on a demilitered zone (DMZ) as a mitigation strategy,” Rapid7 warned,

    At this time, it is not clear whether the attacks were used for data theft or to deploy malware. However, managed file transfer solutions have become high-value targets for data theft campaigns in recent years.

    In the past, the ransomware gang, usually clops, have repeatedly exploited zero-day weaknesses in the same platforms, including large-scale data theft and forced recovery attacks, including Cleo, Movit Transfer, Gonavez MFT and Excelian FTA.


    Knowledgeable

    CISOS knows how to purchase a board begins with a clear, strategic approach how the cloud safety runs the business price.

    This helps to introduce the risk, impact and priorities to the free, editable board report deck deck security leaders in clear business terms. Convert security updates into meaningful conversations and take fast decision in boardroom.

    access administrator attacks Crushftp exploited obtain server zeroday
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleMicrosoft will no longer sell movies or TV shows on PC or Xbox – what happens to the goods you bought
    Next Article I took my side full -time and earned $ 222,000 last year
    PineapplesUpdate
    • Website

    Related Posts

    Security

    Anthropic AI wants to stop the model from evil – how is here

    August 4, 2025
    Security

    Fashion giant channel hit salesforce data theft attacks

    August 4, 2025
    Security

    Oauth -pps Für M365-PHISHING MISSBRAUCT | CSO online

    August 4, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    Top mobile phones under Rs 15,000 in India (August 2025): Redmi Note 14 SE 5G, Tecno Pova 7, IQoo Z10X, and more

    August 5, 2025

    A top designer was banned from drill. Now he is creating his own contestant.

    August 4, 2025

    Anthropic AI wants to stop the model from evil – how is here

    August 4, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.