CVE-2011-2523

9.8 CRITICAL

📋 TL;DR

CVE-2011-2523 is a backdoor in vsftpd 2.3.4 that allows unauthenticated remote attackers to execute arbitrary commands via a shell opened on port 6200/tcp. This affects any system running the compromised version of vsftpd downloaded during a specific timeframe. The vulnerability provides complete system compromise.

💻 Affected Systems

Products:
  • vsftpd
Versions: 2.3.4 (only versions downloaded between June 30, 2011 and July 3, 2011)
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: Only specific builds from the compromised source during that timeframe are affected. Later re-releases of vsftpd 2.3.4 and other versions are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with root-level access, data theft, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to data exfiltration, cryptocurrency mining, or botnet enrollment.

🟢

If Mitigated

Limited impact if vsftpd is not internet-facing and network segmentation restricts access to port 6200.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is trivial - connecting to port 6200 after triggering the backdoor provides shell access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: vsftpd 2.3.5 or later

Vendor Advisory: https://security.appspot.com/vsftpd.html

Restart Required: Yes

Instructions:

1. Stop vsftpd service. 2. Remove compromised vsftpd 2.3.4. 3. Download vsftpd 2.3.5 or later from official source. 4. Install new version. 5. Restart vsftpd service.

🔧 Temporary Workarounds

Block port 6200 with firewall

linux

Prevent access to the backdoor port

iptables -A INPUT -p tcp --dport 6200 -j DROP
iptables -A OUTPUT -p tcp --dport 6200 -j DROP

Disable vsftpd service

linux

Stop the vulnerable service until patched

systemctl stop vsftpd
service vsftpd stop

🧯 If You Can't Patch

  • Replace vsftpd with alternative FTP server software
  • Implement strict network segmentation and firewall rules to isolate affected systems

🔍 How to Verify

Check if Vulnerable:

Check vsftpd version and build date: vsftpd -v 2>&1 | grep '2.3.4' and verify if downloaded during vulnerable timeframe

Check Version:

vsftpd -v 2>&1

Verify Fix Applied:

Verify vsftpd version is 2.3.5 or later: vsftpd -v 2>&1 | grep -v '2.3.4'

📡 Detection & Monitoring

Log Indicators:

  • Unusual connections to port 6200 in system logs
  • Failed authentication attempts followed by port 6200 connections

Network Indicators:

  • Outbound connections from port 6200
  • Unexpected traffic on port 6200

SIEM Query:

destination_port=6200 OR source_port=6200

🔗 References

📤 Share & Export