CVE-2021-41635

8.8 HIGH

📋 TL;DR

CVE-2021-41635 is a privilege escalation vulnerability in MELAG FTP Server 2.2.0.4, where the service runs as SYSTEM on Windows, allowing remote attackers to gain full administrative control over the host system if misconfigurations or other vulnerabilities are exploited. This affects organizations using this specific FTP server version installed as a Windows service.

💻 Affected Systems

Products:
  • MELAG FTP Server
Versions: 2.2.0.4
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable when installed as a Windows service, which runs with SYSTEM privileges by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attackers gain SYSTEM-level access, enabling complete compromise of the host, data theft, ransomware deployment, or lateral movement across the network.

🟠

Likely Case

Attackers exploit the elevated privileges to install malware, exfiltrate sensitive data, or pivot to other systems in the network.

🟢

If Mitigated

Impact is limited if the service is not exposed to untrusted networks, but local privilege escalation risks remain if other vulnerabilities exist.

🌐 Internet-Facing: HIGH, as remote attackers can directly target the FTP server to gain administrative access over the entire system.
🏢 Internal Only: HIGH, because even internal attackers or malware could exploit this for privilege escalation within the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires combining this with other vulnerabilities or misconfigurations in the FTP server, but details are publicly available in advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to a version beyond 2.2.0.4; check vendor for specific fixed version.

Vendor Advisory: https://www.securesystems.de/blog/advisory-and-exploitation-the-melag-ftp-server/

Restart Required: Yes

Instructions:

1. Download the latest version from the MELAG vendor. 2. Uninstall the current version. 3. Install the updated version. 4. Restart the system to apply changes.

🔧 Temporary Workarounds

Change Service Account

windows

Modify the MELAG FTP Server service to run under a non-SYSTEM, least-privilege account to reduce impact.

sc config "MELAG FTP Server" obj= "DOMAIN\User" password= "password"
sc stop "MELAG FTP Server"
sc start "MELAG FTP Server"

Network Segmentation

windows

Restrict network access to the FTP server using firewalls to limit exposure to trusted IPs only.

New-NetFirewallRule -DisplayName "Block FTP Except Trusted" -Direction Inbound -Protocol TCP -LocalPort 21 -RemoteAddress "TrustedIPRange" -Action Allow
New-NetFirewallRule -DisplayName "Deny Other FTP" -Direction Inbound -Protocol TCP -LocalPort 21 -Action Block

🧯 If You Can't Patch

  • Disable or uninstall the MELAG FTP Server if not essential, and use alternative secure FTP solutions.
  • Implement strict network controls and monitor for unusual activity, such as unauthorized access attempts or privilege escalation.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of MELAG FTP Server; if it is 2.2.0.4 and running as a Windows service, it is vulnerable.

Check Version:

wmic product where name="MELAG FTP Server" get version

Verify Fix Applied:

Verify the version is updated beyond 2.2.0.4 and confirm the service is not running as SYSTEM by checking service properties.

📡 Detection & Monitoring

Log Indicators:

  • Unusual FTP login attempts, privilege escalation events in Windows Event Logs (e.g., Event ID 4672).

Network Indicators:

  • Anomalous FTP traffic patterns, connections from untrusted IPs to port 21.

SIEM Query:

source="windows" EventID=4672 OR source="ftp" action="failed login" | stats count by src_ip

🔗 References

📤 Share & Export