CVE-2024-9999

6.5 MEDIUM

📋 TL;DR

This vulnerability allows attackers to bypass two-factor authentication in WS_FTP Server's Web Transfer Module. Users can log in with only username and password, skipping the required second verification factor. Organizations using affected WS_FTP Server versions are impacted.

💻 Affected Systems

Products:
  • WS_FTP Server
Versions: All versions before 8.8.9 (2022.0.9)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Web Transfer Module when two-factor authentication is configured.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain unauthorized access to sensitive files and data, potentially leading to data theft, modification, or deletion of critical information.

🟠

Likely Case

Unauthorized users access FTP resources they shouldn't have permission to view or download, compromising data confidentiality.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to the FTP server itself with no lateral movement to other systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid username and password credentials but bypasses the second authentication factor.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.8.9 (2022.0.9) or later

Vendor Advisory: https://community.progress.com/s/article/WS-FTP-Server-Service-Pack-November-2024

Restart Required: Yes

Instructions:

1. Download WS_FTP Server version 8.8.9 or later from Progress website. 2. Backup current configuration. 3. Run installer to upgrade. 4. Restart WS_FTP Server service. 5. Verify authentication works correctly with 2FA.

🔧 Temporary Workarounds

Disable Web Transfer Module

windows

Temporarily disable the vulnerable Web Transfer Module until patching is possible

Stop WS_FTP Server Web Transfer service

Network Access Control

all

Restrict access to WS_FTP Server to trusted IP addresses only

Configure firewall rules to limit inbound connections

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate WS_FTP Server from sensitive systems
  • Enable detailed authentication logging and monitor for suspicious login attempts

🔍 How to Verify

Check if Vulnerable:

Check WS_FTP Server version in administration console or via installed programs list

Check Version:

Check WS_FTP Server About dialog or installed programs list for version number

Verify Fix Applied:

Test two-factor authentication login process to confirm both factors are required

📡 Detection & Monitoring

Log Indicators:

  • Successful logins without second-factor verification
  • Multiple failed 2FA attempts followed by successful login

Network Indicators:

  • Unusual authentication patterns to WS_FTP Server
  • Access from unexpected IP addresses

SIEM Query:

source="ws_ftp_logs" AND (event="login_success" AND NOT event="2fa_success")

🔗 References

📤 Share & Export