Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • Security Week
  • CrushFTP Blames Security Firms for Fast Exploitation of Vulnerability
  • Security Week

CrushFTP Blames Security Firms for Fast Exploitation of Vulnerability

Eduard Kovacs Published: April 1, 2025 | Updated: April 1, 2025 2 min read
1 views

The Shadowserver Foundation on Monday said it started seeing exploitation attempts aimed at a recently patched CrushFTP vulnerability.

The developers of the CrushFTP enterprise file transfer solution informed customers on March 21 that versions 10 and 11 are affected by a vulnerability that can allow a remote, unauthenticated attacker to gain access to a system.

Patches are included in versions 11.3.1+ and 10.8.4+, and mitigations have also been made available.

Because several days after disclosure CrushFTP developers had yet to announce a CVE identifier, vulnerability intelligence firm VulnCheck took initiative and assigned it CVE-2025-2825, which CrushFTP did not appreciate, saying that the “real CVE is pending”.

On Tuesday morning, CrushFTP told SecurityWeek that the CVE for the vulnerability is actually CVE-2025-31161, which was assigned by Outpost24, the security firm whose researchers have been credited for responsibly disclosing the flaw. 

However, the cybersecurity industry has started using CVE-2025-2825 to track the vulnerability, which it describes as a critical authentication bypass that can be exploited using specially crafted HTTP(S) requests. 

Several security firms have analyzed the vulnerability and shared technical details and even proof-of-concept (PoC) exploit code. 

On March 28, the non-profit cybersecurity organization Shadowserver reported seeing roughly 1,800 unpatched CrushFTP instances worldwide, including more than 900 in the United States. 

Advertisement. Scroll to continue reading.

By March 31, the number of vulnerable instances dropped by a few hundred, but Shadowserver’s honeypots started seeing dozens of exploitation attempts aimed at CVE-2025-2825. The attempts seen by the organization are leveraging the publicly available PoC exploit code. 

CrushFTP told SecurityWeek that those who released technical details are to blame for the vulnerability being weaponized and for companies being targeted so soon after disclosure. The company seems very unhappy with the security firms that rushed to make details public and issue a CVE identifier, describing them as “bad actors”. 

CrushFTP has been pushing users to patch and it plans on sending another email on Tuesday to encourage people to update. 

This is not the first time a CrushFTP vulnerability has been targeted by threat actors. Exactly one year ago, CrushFTP customers were warned about a zero-day vulnerability that had been exploited in targeted attacks. 

Related: Cleo File Transfer Tool Vulnerability Exploited in Wild Against Enterprises

Related: Firefox Affected by Flaw Similar to Chrome Zero-Day Exploited in Russia

Related: Critical Next.js Vulnerability in Hacker Crosshairs

About The Author

Eduard Kovacs

See author's posts

Original post here

What do you feel about this?

  • Security Week

Post navigation

Previous: China-Linked Earth Alux Uses VARGEIT and COBEACON in Multi-Stage Cyber Intrusions
Next: Nearly 24,000 IPs Target PAN-OS GlobalProtect in Coordinated Login Scan Campaign

Author's Other Posts

China Admitted to US That It Conducted Volt Typhoon Attacks: Report Treasury-Hacked-China.jpg

China Admitted to US That It Conducted Volt Typhoon Attacks: Report

April 11, 2025 0 0
GitHub Announces General Availability of Security Campaigns GitHub.jpeg

GitHub Announces General Availability of Security Campaigns

April 10, 2025 0 0
Nissan Leaf Hacked for Remote Spying, Physical Takeover Nissan-Leaf.png

Nissan Leaf Hacked for Remote Spying, Physical Takeover

April 10, 2025 0 0
Operations of Sensor Giant Sensata Disrupted by Ransomware Attack Ransomware-attacks.jpg

Operations of Sensor Giant Sensata Disrupted by Ransomware Attack

April 10, 2025 0 2

Related Stories

Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers

Ionut Arghire April 15, 2025 0 0
ransomware.jpeg
  • Security Week

Kidney Dialysis Services Provider DaVita Hit by Ransomware

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Conduent Says Names, Social Security Numbers Stolen in Cyberattack

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches

Ionut Arghire April 15, 2025 0 0
VC-Funding_China-tech.jpg
  • Security Week

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games

Associated Press April 15, 2025 0 0
Satellite-Link-Cybersecurity.jpg
  • Security Week

Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats

Kevin Townsend April 15, 2025 0 0

Trending Now

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1
GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools hacked.jpg 5
  • The Hacker News

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

December 2, 2025 0 0
Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools npm-mal.jpg 6
  • The Hacker News

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

December 2, 2025 0 1
Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks iran-hacking.jpg 7
  • The Hacker News

Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

December 2, 2025 0 0

You may have missed

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

Sean December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

Sean December 4, 2025 0 0
whatsapp-sim.jpg
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

[email protected] The Hacker News December 2, 2025 0 0
korean.jpg
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

[email protected] The Hacker News December 2, 2025 0 1
Copyright © 2026 All rights reserved. | MoreNews by AF themes.