Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
Reference:
Advisory #2023-142
Version:
1.0
Affected software:
CrushFTP prior to 10.5.6
Type:
Unauthenticated mass-assignment vulnerability
CVE/CVSS:
CVE-2023-43177CVSS 3.x severity and metrics not know at this time
In August 2023, security researchers detected and responsibly disclosed a zero-day vulnerability in CrushFTP software version 10.5.1 and lower. Exploitation of said vulnerability (CVE-2023-43177) could lead to unauthenticated remote code execution.
CrushFTP is an enterprise-grade file transfer server that runs on any operating system that can run Java 8.
Adversaries have developed proof of concept exploits. Compromise could have high impact on confidentiality, integrity and availability.
A security patch is available. Although security researchers indicate that the vulnerability has been fixed in CrushFTP version 10.5.2, the company itself warns that all versions prior to 10.5.6 are vulnerable and advises to update immediately.
Using the capabilities offered by the vulnerability, an attacker can escalate to full system compromise, including root-level remote code execution.
The Centre for Cyber Security Belgium (CCB) strongly recommends to upgrade to the latest version of CrushFTP as indicated by the CrushFTP development team.