CVE-2025-5595

7.3 HIGH

📋 TL;DR

CVE-2025-5595 is a critical buffer overflow vulnerability in FreeFloat FTP Server 1.0's PROGRESS command handler that allows remote attackers to execute arbitrary code or crash the service. This affects all deployments of FreeFloat FTP Server 1.0. The vulnerability is remotely exploitable without authentication.

💻 Affected Systems

Products:
  • FreeFloat FTP Server
Versions: 1.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of FreeFloat FTP Server 1.0 are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Service disruption through denial of service (crash) or limited code execution for foothold establishment.

🟢

If Mitigated

If network segmentation and strict firewall rules are in place, impact is limited to the FTP service itself.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation makes internet-facing instances extremely vulnerable.
🏢 Internal Only: MEDIUM - Internal network exposure still presents risk but with reduced attack surface.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code is available, making exploitation trivial for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: N/A

Restart Required: No

Instructions:

No official patch exists. Consider migrating to a supported FTP server solution.

🔧 Temporary Workarounds

Network Segmentation and Firewall Rules

windows

Block external access to FreeFloat FTP Server ports (default TCP 21) and restrict internal access to trusted IPs only.

netsh advfirewall firewall add rule name="Block FreeFloat FTP" dir=in action=block protocol=TCP localport=21

Disable FreeFloat FTP Service

windows

Stop and disable the FreeFloat FTP Server service to prevent exploitation.

sc stop FreeFloatFTPServer
sc config FreeFloatFTPServer start= disabled

🧯 If You Can't Patch

  • Replace FreeFloat FTP Server with a maintained alternative like FileZilla Server, vsftpd, or ProFTPD
  • Implement strict network access controls and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check if FreeFloat FTP Server 1.0 is installed and running on the system.

Check Version:

Check Windows Services for 'FreeFloat FTP Server' or examine installed programs in Control Panel

Verify Fix Applied:

Verify the service is stopped/disabled or replaced with alternative software.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed connection attempts to FTP port
  • Unusual PROGRESS command usage patterns
  • Service crash events in Windows Event Log

Network Indicators:

  • Unusual traffic to FTP port 21 from untrusted sources
  • Buffer overflow patterns in FTP protocol traffic

SIEM Query:

source="windows" AND (event_id=7036 AND service_name="FreeFloat FTP Server") OR (event_id=4625 AND destination_port=21)

🔗 References

📤 Share & Export