Threat Advisory

WordPress – Critical Vulnerabilities in WS_FTP Server Expose High-Risk Exploitation

October 4, 2023 | By Accorian

Multiple exploitable flaws have been found in numerous versions of the WS_FTP Server, built by Progress Software. One of the most serious is present in WS_FTP Server versions prior to 8.7.4 and 8.8.2, in a module for sending files person-to-person. The module, marketed by Progress Software as the Ad Hoc Transfer Module, is vulnerable to an attack that converts a hypertext transfer protocol message into a malicious object that can execute arbitrary code, a technique known as deserialization. 

The identified flaw is a deserialization flaw in WS_FTP, a popular FTP server software. This vulnerability allows malicious actors to execute arbitrary code on affected servers potentially. About 2,900 hosts on the internet were found to be running WS_FTP and had their web servers exposed, making them vulnerable to exploitation. These instances primarily belonged to large enterprises, governments, and educational institutions. Progress Software has since released patches for eight vulnerabilities and strongly recommends that all users update their WS_FTP installations to protect against potential attacks.

The updates include a patch for the .NET deserialization vulnerability, tracked as CVE-2023-40044, through which attackers can remotely execute arbitrary code. The U.S. Health Sector Cybersecurity Coordination Center, or HC3, in a Friday alert, said it “strongly encourages all users to follow the manufacturer’s recommendation and upgrade to the highest version available – 8.8.2 – to prevent any damage from occurring.” Security experts have warned all organizations that use secure file transfer tools to review their documentation to identify how such software can be locked down.

Accorian strongly recommends that all users update their WS_FTP installations to protect against potential attacks.

Source: https://www.databreachtoday.com/alert-attackers-actively-exploiting-wsftp-vulnerabilities-a-23200

For any further assistance, kindly reachout to us on info@accorian.com

Threat Advisory

Team Accorian

Recent Post

Ready to Start?

Ready to Start?​


Drop your CVs to joinourteam@accorian.com

Interested Position

Download Case study

Download SOC2 Guide