CVE-2025-31161

9.8 CRITICAL CISA KEV

📋 TL;DR

This critical authentication bypass vulnerability in CrushFTP allows unauthenticated attackers to gain administrative access by exploiting a race condition and header manipulation in the AWS4-HMAC authorization method. Attackers can authenticate as any known or guessable user (including the crushadmin account) without credentials, leading to full system compromise. All CrushFTP 10 and 11 installations before patched versions are affected.

💻 Affected Systems

Products:
  • CrushFTP
Versions: CrushFTP 10 before 10.8.4 and CrushFTP 11 before 11.3.1
Operating Systems: All platforms running CrushFTP
Default Config Vulnerable: ⚠️ Yes
Notes: DMZ proxy instances are NOT vulnerable. All other configurations are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with administrative privileges, data exfiltration, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Administrative account compromise leading to sensitive data access, configuration changes, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact if DMZ proxy configuration is used, but still significant risk of unauthorized access.

🌐 Internet-Facing: HIGH - Directly exploitable over HTTP/HTTPS without authentication, actively exploited in the wild.
🏢 Internal Only: HIGH - Even internal systems are vulnerable to authenticated users or attackers who gain initial foothold.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Actively exploited in the wild since March 2025. Exploitation is trivial with publicly available tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: CrushFTP 10.8.4 and CrushFTP 11.3.1

Vendor Advisory: https://crushftp.com/crush11wiki/Wiki.jsp?page=Update#section-Update-VulnerabilityInfo

Restart Required: Yes

Instructions:

1. Download latest version from CrushFTP website. 2. Backup current installation. 3. Install update following vendor instructions. 4. Restart CrushFTP service.

🔧 Temporary Workarounds

Enable DMZ Proxy Configuration

all

Configure CrushFTP to run behind a DMZ proxy, which prevents exploitation of this vulnerability.

Configure DMZ proxy per CrushFTP documentation: https://crushftp.com/crush11wiki/Wiki.jsp?page=DMZ

Network Segmentation

all

Restrict access to CrushFTP HTTP/HTTPS ports to trusted networks only.

Configure firewall rules to limit access to CrushFTP ports (typically 80, 443, 8080, 8443)

🧯 If You Can't Patch

  • Immediately implement DMZ proxy configuration as temporary mitigation
  • Isolate CrushFTP server from internet and restrict internal access to essential users only

🔍 How to Verify

Check if Vulnerable:

Check CrushFTP version in admin interface or via system logs. Versions before 10.8.4 (for v10) or 11.3.1 (for v11) are vulnerable.

Check Version:

Check CrushFTP admin panel or review server startup logs for version information

Verify Fix Applied:

Confirm version is 10.8.4 or higher (for v10) or 11.3.1 or higher (for v11) in admin interface.

📡 Detection & Monitoring

Log Indicators:

  • Failed AWS4-HMAC authentication attempts with malformed headers
  • Successful authentication from unusual IP addresses
  • Index-out-of-bounds errors in server logs

Network Indicators:

  • HTTP requests with malformed AWS4-HMAC headers containing only username and slash
  • Unusual authentication patterns to CrushFTP HTTP ports

SIEM Query:

source="crushftp.log" AND ("AWS4-HMAC" OR "index-out-of-bounds" OR "crushadmin login")

🔗 References

📤 Share & Export