By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: CISA Adds CrushFTP Vulnerability to KEV Catalog Following Confirmed Active Exploitation
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > CISA Adds CrushFTP Vulnerability to KEV Catalog Following Confirmed Active Exploitation
Tech News

CISA Adds CrushFTP Vulnerability to KEV Catalog Following Confirmed Active Exploitation

By Viral Trending Content 5 Min Read
Share
SHARE

Apr 08, 2025Ravie LakshmananCyber Attack / Vulnerability

CrushFTP Vulnerability

A recently disclosed critical security flaw impacting CrushFTP has been added by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to its Known Exploited Vulnerabilities (KEV) catalog after reports emerged of active exploitation in the wild.

The vulnerability is a case of authentication bypass that could permit an unauthenticated attacker to take over susceptible instances. It has been fixed in versions 10.8.4 and 11.3.1.

“CrushFTP contains an authentication bypass vulnerability in the HTTP authorization header that allows a remote unauthenticated attacker to authenticate to any known or guessable user account (e.g., crushadmin), potentially leading to a full compromise,” CISA said in an advisory.

The shortcoming has been assigned the CVE identifier CVE-2025-31161 (CVSS score: 9.8). It bears noting that the same vulnerability was previously tracked as CVE-2025-2825, which has now been marked Rejected in the CVE list.

Cybersecurity

The development comes after the disclosure process associated with the flaw has been entangled in controversy and confusion, with VulnCheck – due to it being a CVE Numbering Authority (CNA) – assigned an identifier (i.e., CVE-2025-2825), while the actual CVE (i.e., CVE-2025-31161) had been pending.

Outpost24, which is credited with responsibly disclosing the flaw to the vendor, has stepped in to clarify that it requested a CVE number from MITRE on March 13, 2025, and that it was coordinating with CrushFTP to ensure that the fixes were rolled out within a 90-day disclosure period.

However, it wasn’t until March 27 that MITRE assigned the flaw the CVE CVE-2025-31161, by which time VulnCheck had released a CVE of its own without contacting “CrushFTP or Outpost24 beforehand to see if a responsible disclosure process was already underway.”

The Swedish cybersecurity company has since released step-by-step instructions to trigger the exploit without sharing much of the technical specifics –

  • Generate a random alphanumeric session token of a minimum 31 characters of length
  • Set a cookie called CrushAuth to the value generated in step 1
  • Set a cookie called currentAuth to the last 4 characters of the value generated in step 1
  • Perform an HTTP GET request to the target /WebInterface/function/ with the cookies from steps 2 and 3, as well as an Authorization header set to “AWS4-HMAC=/,” where is the user to be signed in as (e.g., crushadmin)

A net result of these actions is that the session generated at the start gets authenticated as the chosen user, allowing an attacker to execute any commands that user has rights to.

Huntress, which re-created a proof-of-concept for CVE-2025-31161, said it observed in-the-wild exploitation of CVE-2025-31161 on April 3, 2025, and that it uncovered further post-exploitation activity involving the use of MeshCentral agent and other malware. There is some evidence to suggest that the compromise may have happened as early as March 30.

The cybersecurity firm said it has seen exploitation efforts targeting four distinct hosts from four different companies to date, adding three of those affected were hosted by the same managed service provider (MSP). The names of the impacted companies were not disclosed, but they belong to marketing, retail, and semiconductor sectors.

Cybersecurity

The threat actors have been found to weaponize the access to install legitimate remote desktop software such as AnyDesk and MeshAgent, while also taking steps to harvest credentials in at least one instance.

After deploying MeshAgent, the attackers are said to have added a non-admin user (“CrushUser”) to the local administrators group and delivered another C++ binary (“d3d11.dll”), an implementation of the open-source library TgBot.

“Tt is likely that the threat actors are making use of a Telegram bot to collect telemetry from infected hosts,” Huntress researchers said.

As of April 6, 2025, there are 815 unpatched instances vulnerable to the flaw, with 487 of them located in North America and 250 in Europe. In light of active exploitation, Federal Civilian Executive Branch (FCEB) agencies are required to apply the necessary patches by April 28 to secure their networks.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

Honor Magic V5 Foldable Specs Officially Revealed

Hydrow Discount Code: Save Up to $150 in July

eir Achieves 99% 5G Coverage as Network Traffic Surges by 60% Year-on-Year

Top 5 Upgrades of the Google Pixel 10 Pro XL

North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign

TAGGED: cyber attacks, Cyber Security, Cybersecurity, data breach, Information security, Internet, Malware, Risk management, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article Undetectable AI’s Chatbot vs. ChatGPT: Bypassing AI Detection?
Next Article LGBTQ+ travellers forgo trips to the US as gender rules on passports change
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

India’s macro setup stable, but markets await earnings firepower: Hemang Jani
Business
Mecha BREAK Peaks at Nearly 133,000 Concurrent Players on Steam at Launch
Gaming News
Honor Magic V5 Foldable Specs Officially Revealed
Tech News
Hydrow Discount Code: Save Up to $150 in July
Tech News
Clayton Kershaw, a throwback to baseball's past, could be the last to 3,000 strikeouts
Sports
ETH price prediction: Ether eyes $2,879 as technical indicators switch bullish
Crypto
Trump administration withholds $70 million in K-12 school funding from Colorado
Politics

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

India’s macro setup stable, but markets await earnings firepower: Hemang Jani

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
India’s macro setup stable, but markets await earnings firepower: Hemang Jani
July 3, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?