CVE-2025-14242

6.5 MEDIUM

📋 TL;DR

This vulnerability in vsftpd allows a remote authenticated attacker to cause a denial of service (DoS) by sending a specially crafted STAT command that triggers an integer overflow during ls command parameter parsing. The flaw can crash the vsftpd service, disrupting FTP operations. Systems running vulnerable versions of vsftpd with authenticated user access are affected.

💻 Affected Systems

Products:
  • vsftpd
Versions: Specific versions not detailed in references; check Red Hat advisories for exact ranges
Operating Systems: Linux distributions including Red Hat Enterprise Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access; anonymous FTP configurations may be less vulnerable if authentication is disabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of vsftpd, requiring manual restart and potentially causing extended FTP service downtime.

🟠

Likely Case

Temporary service crash affecting FTP availability until the service is restarted.

🟢

If Mitigated

Minimal impact if proper network segmentation and authentication controls limit access to trusted users only.

🌐 Internet-Facing: HIGH - Internet-facing FTP servers are directly accessible to potential attackers.
🏢 Internal Only: MEDIUM - Internal attackers with valid credentials could still exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires sending a crafted STAT command with specific byte sequence.

Exploitation requires valid user credentials; no public exploit code identified in references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check specific Red Hat advisories (RHSA-2026:0605, RHSA-2026:0606, RHSA-2026:0608) for patched versions.

Vendor Advisory: https://access.redhat.com/security/cve/CVE-2025-14242

Restart Required: Yes

Instructions:

1. Update vsftpd using your distribution's package manager (e.g., 'yum update vsftpd' on RHEL). 2. Restart the vsftpd service (e.g., 'systemctl restart vsftpd'). 3. Verify the update with 'rpm -q vsftpd' or equivalent.

🔧 Temporary Workarounds

Restrict FTP Access

linux

Limit vsftpd access to trusted IP addresses using firewall rules or vsftpd configuration.

iptables -A INPUT -p tcp --dport 21 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 21 -j DROP

Disable STAT Command

linux

Configure vsftpd to reject STAT commands if not required for functionality.

Add 'cmds_denied=STAT' to vsftpd.conf

🧯 If You Can't Patch

  • Implement strict network access controls to limit FTP access to essential users only.
  • Monitor vsftpd logs for unusual STAT command patterns and set up alerts for service crashes.

🔍 How to Verify

Check if Vulnerable:

Check vsftpd version against Red Hat advisories; examine if STAT command processing is enabled.

Check Version:

rpm -q vsftpd  # On RHEL-based systems

Verify Fix Applied:

Confirm vsftpd version is updated per vendor advisories and test STAT command functionality.

📡 Detection & Monitoring

Log Indicators:

  • vsftpd service crashes or restarts
  • Unusual STAT command patterns in vsftpd logs

Network Indicators:

  • Multiple STAT commands from single source in short time

SIEM Query:

source="vsftpd" AND (STAT OR crash)

🔗 References

📤 Share & Export