CVE-2025-54309

9.0 CRITICAL CISA KEV

📋 TL;DR

This vulnerability in CrushFTP allows remote attackers to bypass AS2 validation and gain administrative access via HTTPS when the DMZ proxy feature is not used. It affects CrushFTP servers running vulnerable versions and has been actively exploited in the wild since July 2025.

💻 Affected Systems

Products:
  • CrushFTP
Versions: CrushFTP 10 before 10.8.5 and CrushFTP 11 before 11.3.4_23
Operating Systems: All platforms running CrushFTP
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where DMZ proxy feature is NOT used. Systems with DMZ proxy enabled are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the CrushFTP server with administrative privileges, enabling data theft, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Attackers gain admin access to the FTP server, allowing them to exfiltrate sensitive files, modify configurations, and deploy malware.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent lateral movement from the compromised FTP server.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Actively exploited in the wild since July 2025. Exploitation requires HTTPS access to the CrushFTP server.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: CrushFTP 10.8.5 or CrushFTP 11.3.4_23

Vendor Advisory: https://www.crushftp.com/crush11wiki/Wiki.jsp?page=CompromiseJuly2025

Restart Required: Yes

Instructions:

1. Download the patched version from CrushFTP website. 2. Stop the CrushFTP service. 3. Install the update. 4. Restart the CrushFTP service.

🔧 Temporary Workarounds

Enable DMZ Proxy Feature

all

Enabling the DMZ proxy feature mitigates the vulnerability as it's only exploitable when DMZ proxy is not used.

Configure DMZ proxy in CrushFTP admin interface: Admin → Server Settings → DMZ Proxy → Enable

🧯 If You Can't Patch

  • Enable DMZ proxy feature immediately as temporary mitigation
  • Restrict network access to CrushFTP server using firewall rules to only trusted IP addresses

🔍 How to Verify

Check if Vulnerable:

Check CrushFTP version in admin interface or via system logs. Versions 10.x before 10.8.5 and 11.x before 11.3.4_23 are vulnerable.

Check Version:

Check CrushFTP admin interface or logs for version information

Verify Fix Applied:

Verify version is 10.8.5 or higher for v10, or 11.3.4_23 or higher for v11. Test admin access controls.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected admin login events
  • AS2 validation failures
  • Configuration changes from unknown IPs

Network Indicators:

  • HTTPS requests to CrushFTP admin endpoints from unusual sources
  • Unusual file transfer patterns

SIEM Query:

source="crushftp.log" AND (event="admin_login" OR event="as2_validation") AND result="success" AND src_ip NOT IN [trusted_ips]

🔗 References

📤 Share & Export