Summary:

- A critical pre-authentication flaw in Progress Software's WS_FTP server has been exploited just days after patches were released.

- Cybersecurity vendor Rapid7 has detected instances of live exploitation of the vulnerability in various customer environments.

- The vulnerability, CVE-2023-40044, is easy to exploit and affects all WS_FTP Server versions prior to 8.7.4 and 8.8.2.

- The flaw affects the entire Ad Hoc Transfer component of WS_FTP and can be triggered over the internet.

- The issue was discovered by Assetnote, which found nearly 3,000 hosts running WS_FTP with an exposed web server.

- Progress Software's security response team is responding to a wave of ransomware attacks that exploited zero-day flaws in its MOVEit software.

Hashtags: #WSFTP #vulnerability #exploitation #cybersecurity #progresssoftware #ransomware

https://www.securityweek.com/live-exploitation-underscores-urgency-to-patch-critical-ws-ftp-server-flaw/

Reply to this note

Please Login to reply.

Discussion

No replies yet.