Alert - Vulnerability impacting CrushFTP

Number: AL25-003
Date: April 2, 2025

Audience

This Alert is intended for IT professionals and managers of notified organizations.

Purpose

An Alert is used to raise awareness of a recently identified cyber threat Cyber threatA threat actor, using the internet, who takes advantage of a known vulnerability in a product for the purposes of exploiting a network and the information the network carries. that may impact cyber information assets, and to provide additional detection DetectionThe monitoring and analyzing of system events in order to identify unauthorized attempts to access system resources. and mitigation advice to recipients. The Canadian Centre for Cyber Security Cyber securityThe protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information. More specifically, cyber security includes the body of technologies, processes, practices and response and mitigation measures designed to protect networks, computers, programs and data from attack, damage or unauthorized access so as to ensure confidentiality, integrity and availability. ("Cyber Centre") is also available to provide additional assistance regarding the content of this Alert to recipients as requested.

Details

On March 21, 2025, CrushFTP released a security bulletin for a critical vulnerability VulnerabilityA flaw or weakness in the design or implementation of an information system or its environment that could be exploited to adversely affect an organization's assets or operations. affecting versions v10 and v11 of CrushFTP. The issue is described as an unauthenticated HTTP(S) port access bypass vulnerability. The versions of CrushFTP affected areFootnote 1:

  • 10.0.0 to 10.8.3
  • 11.0.0 to 11.3.0

In response to this vulnerability, the Cyber Centre released AV25-165 on March 26, 2025Footnote 2.

The Cyber Centre is aware that a proof of concept (POC) is available, and we are aware of reports of exploitation. The existence of a published POC makes it imperative to take action to assess and mitigate this vulnerability.

Suggested actions

The Cyber Centre strongly recommends that organizations update to CrushFTP versions 10.8.4+ or 11.3.1+.Footnote 1:

The vendor states, the exploit does not work if you have the DMZ DMZSee demilitarized zone. proxy instance of CrushFTP in placeFootnote 1Footnote 3

The Cyber Centre recommends that organizations:

  • Assess the installations of CrushFTP.
  • Apply software update to CrushFTP without delay.
  • Monitor affected systems for exploitation.

In addition, the Cyber Centre strongly recommends that organizations review and implement the Cyber Centre’s Top 10 IT Security ActionsFootnote 4 with an emphasis on the following strategies:

  • Consolidate, monitor, and defend Internet gateways
  • Patch operating systems and applications
  • Isolate web-facing applications

If activity matching the content of this alert is discovered, recipients are encouraged to report via the My Cyber Portal, or email contact@cyber.gc.ca.

Date modified: