CrushFTP Warns of Critical HPPS Port Vulnerability Exposing Servers

In a recent security advisory, CrushFTP, a popular file transfer software provider, has disclosed a critical vulnerability affecting both versions 10 and 11 of their product.

The flaw, which allows unauthenticated access to HTTP(S) ports, was announced on March 21, 2025, prompting urgent action from users worldwide.

The vulnerability, yet to be assigned a CVE number, potentially enables attackers to gain unauthorized access to unpatched servers exposed to the internet via HTTP(S) ports.

This security breach could lead to data theft and possible server compromise, putting sensitive information at risk.

Impact and Scope

The severity of this vulnerability cannot be overstated. With approximately 2,700 CrushFTP instances having their web interfaces exposed online, the potential for widespread exploitation is significant.

The flaw affects all CrushFTP v11 versions and, contrary to initial reports, also impacts v10 installations.

Risk Assessment Table

FactorLevelDescription
SeverityHighAllows unauthenticated access to servers
ExploitabilityMediumRequires exposed HTTP(S) ports
Affected VersionsWideBoth v10 and v11 of CrushFTP
Mitigation AvailabilityAvailableThe patch was released in v11.3.1+

Mitigation Strategies

CrushFTP has released a patch to address this vulnerability in version 11.3.1 and later.

Users are strongly advised to update their installations immediately, without waiting for regular patch cycles.

The company has provided a straightforward update process:

  1. Log in to the dashboard using the “crushadmin” equivalent user in the WebInterface.
  2. Navigate to the “about” tab.
  3. Click “Update” > “Update Now”.
  4. Wait approximately 5 minutes for the update to complete and the server to restart automatically.

For those unable to update immediately, enabling the DMZ (demilitarized zone) feature of CrushFTP can provide some protection against the vulnerability.

However, it’s important to note that while the DMZ offers an additional layer of security, it does not fully mitigate the risk, and updating remains the recommended course of action.

The disclosure of this vulnerability underscores the critical nature of file transfer technologies as high-value targets for cybercriminals.

These systems often handle sensitive data, making them attractive to ransomware operators and other malicious actors seeking to gain access quickly and exfiltrate valuable information.

In light of this threat, organizations using CrushFTP are advised to take the following precautions:

  1. Update to the latest version (v11.3.1+) immediately.
  2. Implement strong authentication methods, including multi-factor authentication where possible.
  3. Regularly review and update access controls to ensure only authorized personnel can access sensitive data.
  4. Encrypt all data transfers to protect against interception.
  5. Conduct regular security audits and vulnerability assessments of file transfer systems.

The CrushFTP vulnerability serves as a stark reminder of the ongoing challenges in maintaining secure file transfer protocols.

As cyber threats continue to evolve, organizations must remain vigilant, promptly apply security patches, and adopt comprehensive security measures to protect their valuable data assets.

By taking swift action to address this vulnerability, CrushFTP users can significantly reduce their risk exposure and ensure the continued security of their file transfer operations.

As the situation develops, users should stay informed about any further updates or recommendations from CrushFTP and security experts in the field.

Also Read:

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here