Summary:
- A critical pre-authentication flaw in Progress Software's WS_FTP server has been exploited just days after patches were released.
- Cybersecurity vendor Rapid7 has detected instances of live exploitation of the vulnerability in various customer environments.
- The vulnerability, CVE-2023-40044, is easy to exploit and affects all WS_FTP Server versions prior to 8.7.4 and 8.8.2.
- The flaw affects the entire Ad Hoc Transfer component of WS_FTP and can be triggered over the internet.
- The issue was discovered by Assetnote, which found nearly 3,000 hosts running WS_FTP with an exposed web server.
- Progress Software's security response team is responding to a wave of ransomware attacks that exploited zero-day flaws in its MOVEit software.
Hashtags: #WSFTP #vulnerability #exploitation #cybersecurity #progresssoftware #ransomware