CVE-2024-58299

9.8 CRITICAL

📋 TL;DR

PCMan FTP Server 2.0 contains a critical buffer overflow vulnerability in the 'pwd' command that allows remote attackers to execute arbitrary code. Attackers can exploit this during FTP login by sending a specially crafted payload to overwrite memory and potentially gain full system control. Anyone running PCMan FTP Server 2.0 is affected.

💻 Affected Systems

Products:
  • PCMan FTP Server
Versions: 2.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of version 2.0 are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Remote code execution allowing attackers to install malware, steal credentials, or pivot to other systems on the network.

🟢

If Mitigated

Attack blocked at network perimeter or detected before successful exploitation.

🌐 Internet-Facing: HIGH - Directly exploitable over FTP protocol without authentication.
🏢 Internal Only: HIGH - Even internally, any attacker with network access can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available and requires no authentication. The vulnerability is trivial to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: N/A

Restart Required: No

Instructions:

No official patch exists. The software appears to be abandoned. Recommended action is to migrate to a supported FTP server solution.

🔧 Temporary Workarounds

Network Access Control

all

Block FTP traffic (port 21) at network perimeter and internally using firewall rules.

Service Disablement

windows

Stop and disable the PCMan FTP Server service.

sc stop "PCMan FTP Server"
sc config "PCMan FTP Server" start= disabled

🧯 If You Can't Patch

  • Immediately remove PCMan FTP Server from all systems and replace with a supported, secure FTP solution.
  • Implement strict network segmentation to isolate any remaining vulnerable systems and monitor for exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Check if PCMan FTP Server 2.0 is installed and running on port 21. Use 'netstat -an | findstr :21' and check installed programs.

Check Version:

Check program files directory for PCMan FTP Server version information or registry entries.

Verify Fix Applied:

Verify the service is stopped and disabled, or that the software has been completely uninstalled.

📡 Detection & Monitoring

Log Indicators:

  • Unusual FTP login attempts with long 'pwd' commands
  • Failed authentication attempts followed by buffer overflow patterns

Network Indicators:

  • FTP traffic to port 21 with abnormally long command strings
  • Multiple failed login attempts from single source

SIEM Query:

source="ftp.log" AND (command="PWD" AND length>100) OR (command CONTAINS "A"*100)

🔗 References

📤 Share & Export