CVE-2025-53896

7.1 HIGH

📋 TL;DR

Kiteworks MFT versions before 9.1.0 have a session timeout vulnerability where user sessions may not properly expire after inactivity. This allows attackers with physical or network access to potentially hijack active sessions. All organizations using vulnerable Kiteworks MFT versions are affected.

💻 Affected Systems

Products:
  • Kiteworks MFT
Versions: All versions prior to 9.1.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments where session timeout functionality is expected to work. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers hijack administrative sessions to gain full control over the MFT system, exfiltrate sensitive files, modify workflows, or deploy malware through the trusted platform.

🟠

Likely Case

Unauthorized users access abandoned workstations or network sessions to view or download files they shouldn't have access to, leading to data exposure.

🟢

If Mitigated

With proper network segmentation, workstation locking policies, and monitoring, impact is limited to potential unauthorized file access from specific compromised endpoints.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to an active session (physical workstation access or network session hijacking). No authentication bypass is involved.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.1.0

Vendor Advisory: https://github.com/kiteworks/security-advisories/security/advisories/GHSA-23h2-3jj8-58hm

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Download Kiteworks MFT version 9.1.0 from official sources. 3. Follow vendor upgrade documentation for your deployment type. 4. Restart all Kiteworks services after upgrade. 5. Verify session timeout functionality works correctly.

🔧 Temporary Workarounds

Enforce workstation locking policies

all

Implement strict workstation auto-lock policies to mitigate physical session hijacking risks.

Reduce session timeout values

all

Configure shorter session timeout values in Kiteworks settings to limit exposure window.

🧯 If You Can't Patch

  • Implement strict workstation auto-lock policies (5-10 minute timeout maximum)
  • Enforce network segmentation to limit which systems can access Kiteworks MFT

🔍 How to Verify

Check if Vulnerable:

Check Kiteworks version via admin interface or system logs. If version is below 9.1.0, system is vulnerable.

Check Version:

Check Kiteworks admin dashboard or run 'kiteworks-version' command on the server

Verify Fix Applied:

After upgrading to 9.1.0, test session timeout by logging in and waiting for configured timeout period. Session should properly expire.

📡 Detection & Monitoring

Log Indicators:

  • Unusually long session durations
  • Multiple failed logout attempts
  • Session renewal without re-authentication

Network Indicators:

  • Session tokens being used from unexpected IP addresses
  • Multiple concurrent sessions from same user

SIEM Query:

source="kiteworks" AND (event="session_timeout_failed" OR session_duration>3600)

🔗 References

📤 Share & Export