• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
critical update: crushftp zero day flaw exploited in targeted attacks

Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks

You are here: Home / General Cyber Security News / Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
April 20, 2024

People of the CrushFTP company file transfer computer software are being urged to update to the most up-to-date edition next the discovery of a security flaw that has come less than focused exploitation in the wild.

“CrushFTP v11 versions underneath 11.1 have a vulnerability exactly where users can escape their VFS and obtain process data files,” CrushFTP reported in an advisory produced Friday. “This has been patched in v11.1..”

That reported, prospects who are operating their CrushFTP circumstances within a DMZ (demilitarized zone) limited environment are safeguarded from the attacks.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

Simon Garrelou of Airbus CERT has been credited with getting and reporting the flaw. It has nevertheless to be assigned a CVE identifier.

Cybersecurity enterprise CrowdStrike, in a article shared on Reddit, said it has noticed an exploit for the flaw staying made use of in the wild in a “targeted trend.”

CrushFTP Zero-Day Flaw

These intrusions are reported to have generally qualified U.S. entities, with the intelligence gathering action suspected to be politically motivated.

“CrushFTP customers should really keep on to comply with the vendor’s web page for the most up-to-date guidance and prioritize patching,” CrowdStrike explained.

Uncovered this report intriguing? Observe us on Twitter  and LinkedIn to study more exclusive articles we publish.


Some areas of this report are sourced from:
thehackernews.com

Previous Post: «blacktech targets tech, research, and gov sectors new 'deuterbear' tool BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Next Post: Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack palo alto networks discloses more details on critical pan os flaw»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Copyright © TheCyberSecurity.News, All Rights Reserved.