Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » CISA adds a crushftp vulnerability to the KEV directory after confirmed active operation
Global Security

CISA adds a crushftp vulnerability to the KEV directory after confirmed active operation

AdminBy AdminApril 8, 2025No Comments4 Mins Read
CrushFTP Vulnerability
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


April 8, 2025Red LakshmananCyber ​​-aataka / vulnerability

Crushftp vulnerability

A recently disclosed The critical lack of security affecting Crushftp was added US Agency for Cybersecurity and Infrastructure (CISA) to known exploited vulnerabilities (Ship) Catalog after reporting active exploitation in the wild.

A vulnerability This is the incident of Byipas authentication that can allow an unauthorized attacker to take sensitive instances. It was fixed In versions 10.8.4 and 11.3.1.

“Crushftp contains authentication vulnerability in the HTTP authorization header, which allows a remotely unauthorized attacker to undergo any known or mentioned user account (eg, Crushadmin), which potentially leads to a complete compromise,” Cisa said in consultation.

Near was the Cve ID has been assigned Cve-2025-31161 (CVSS assessment: 9.8). This is noted that the same vulnerability was previously tracked as Cve-2025-2825Which has now been noted rejected in the CVE list.

Cybersecurity

Development occurs after the disclosure process associated with the deficiency was confused in the dispute and confusion, with the Vulncheck-because it was the Cve (CNA) body-assigned ID (ie Cve-2025-2825), while the actual CVE (IE, Cve-2015-3116).

Outpost24, which is attributed to responsibly disclose the deficiency of the provider, has came in To clarify that he demanded a CVE number of Mitter on March 13, 2025 and that he coordinate with CrushftP to make sure that the fixes were deployed for a 90-day disclosure period.

However, only on March 27, Mitter assigned a lack of CVE-2025-3161, so far, Vulncheck released its own CVE without resorting to “Crushftp or Outpost24 in advance to find out if there was already a responsible disclosure process.”

Swedish cybersecurity campaign has since released step-by-step instructions for launching operations without sharing most technical specifics-

  • Create random alphanna -numerical token with a minimum of 31 characters long
  • Set a cookie called Crushauth to the value obtained at the stage 1
  • Set the Cookie called Currentauth, to the last 4 characters obtained at Phase 1
  • Complete HTTP Request for the Target/Webinterface/Function/Failing Fuel from Steps 2 and 3, as well as the permission title set in ‘AWS4-HMAC =/, “Where is a user who must be signed as (eg, Crussmin)

The pure result of these actions is that the session obtained at the beginning receives authentication as the selected user, allowing the attacker to perform any commands to which the user has.

Dear, which resumed the proof of the concept for CVE-2025-3161, – Note On April 3, 2025, it was on the operation of the CVE-2025-3161, and that it revealed further activity after operation, which provides for the use of a mescent agent and other malware. There are some data that suggest that a compromise can happen on March 30.

Cybersecurity firm said they saw efforts to operate four different hosts from four different companies today, adding that the three victims were organized by the same managed service provider (MSP). The names of the affected companies were not disclosed, but they belong to marketing, retail and semiconductor sectors.

Cybersecurity

It has been found that the threat to armed access to the installation of legal software for a remote desktop, such as Anydesk and Meshagent, and take action to collect powers at least in one case.

After the deployment of Meshagent, as they say Tgbot.

“TT is likely that the threatens use telegram to collect telemetry from infected hosts,” Huntress researchers said.

As of April 6, 2025, there are 815 unprotected instances Vulnerable to lack, of 487 of them are located in North America and 250 in Europe. In light of the active exploitation of the Federal Civil Executive Agency (FCEB), the necessary patches must be applied by April 28 to provide their networks.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.