CVE-2021-47865

7.5 HIGH

📋 TL;DR

CVE-2021-47865 is a denial of service vulnerability in ProFTPD that allows attackers to overwhelm FTP servers by creating multiple simultaneous connections. This can exhaust server connection limits and block legitimate user access. Any organization running vulnerable ProFTPD versions is affected.

💻 Affected Systems

Products:
  • ProFTPD
Versions: 1.3.7a specifically
Operating Systems: Linux, Unix, BSD variants
Default Config Vulnerable: ⚠️ Yes
Notes: All ProFTPD 1.3.7a installations are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete FTP service unavailability for extended periods, disrupting file transfer operations and potentially affecting dependent business processes.

🟠

Likely Case

Temporary FTP service degradation or intermittent outages during attack periods, impacting file transfer operations.

🟢

If Mitigated

Minimal impact with proper connection limiting, rate limiting, and network controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available and requires minimal technical skill to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.7b and later

Vendor Advisory: http://www.proftpd.org/

Restart Required: Yes

Instructions:

1. Download latest ProFTPD version from proftpd.org. 2. Stop ProFTPD service. 3. Backup configuration files. 4. Install updated version. 5. Restart ProFTPD service.

🔧 Temporary Workarounds

Connection Rate Limiting

linux

Implement connection rate limiting using iptables or similar firewall rules

iptables -A INPUT -p tcp --dport 21 -m state --state NEW -m recent --set
iptables -A INPUT -p tcp --dport 21 -m state --state NEW -m recent --update --seconds 60 --hitcount 10 -j DROP

MaxClients Configuration

all

Reduce MaxClients setting in proftpd.conf to limit simultaneous connections

MaxClients 10
MaxClientsPerHost 2

🧯 If You Can't Patch

  • Implement network-level rate limiting for FTP port (21/tcp)
  • Use load balancer or WAF with connection limiting capabilities

🔍 How to Verify

Check if Vulnerable:

Check ProFTPD version with: proftpd -v

Check Version:

proftpd -v

Verify Fix Applied:

Verify version is 1.3.7b or higher: proftpd -v | grep -q '1.3.7[b-z]' && echo 'Patched'

📡 Detection & Monitoring

Log Indicators:

  • Rapid succession of new connections from single IP
  • MaxClients limit reached messages
  • Connection refused errors in logs

Network Indicators:

  • High volume of TCP SYN packets to port 21
  • Multiple simultaneous FTP connections from single source

SIEM Query:

source_port=21 AND (event_type="connection_attempt" OR event_type="authentication_failure") | stats count by src_ip | where count > 10

🔗 References

📤 Share & Export