• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
critical update: crushftp zero day flaw exploited in targeted attacks

Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks

You are here: Home / General Cyber Security News / Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
April 20, 2024

People of the CrushFTP company file transfer computer software are being urged to update to the most up-to-date edition next the discovery of a security flaw that has come less than focused exploitation in the wild.

“CrushFTP v11 versions underneath 11.1 have a vulnerability exactly where users can escape their VFS and obtain process data files,” CrushFTP reported in an advisory produced Friday. “This has been patched in v11.1..”

That reported, prospects who are operating their CrushFTP circumstances within a DMZ (demilitarized zone) limited environment are safeguarded from the attacks.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

Simon Garrelou of Airbus CERT has been credited with getting and reporting the flaw. It has nevertheless to be assigned a CVE identifier.

Cybersecurity enterprise CrowdStrike, in a article shared on Reddit, said it has noticed an exploit for the flaw staying made use of in the wild in a “targeted trend.”

CrushFTP Zero-Day Flaw

These intrusions are reported to have generally qualified U.S. entities, with the intelligence gathering action suspected to be politically motivated.

“CrushFTP customers should really keep on to comply with the vendor’s web page for the most up-to-date guidance and prioritize patching,” CrowdStrike explained.

Uncovered this report intriguing? Observe us on Twitter  and LinkedIn to study more exclusive articles we publish.


Some areas of this report are sourced from:
thehackernews.com

Previous Post: «blacktech targets tech, research, and gov sectors new 'deuterbear' tool BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Next Post: Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack palo alto networks discloses more details on critical pan os flaw»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • 6 Steps to 24/7 In-House SOC Success
  • Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
  • 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
  • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.