CVE-2024-4040 exploited in the wild: everything you need to know

Detect and mitigate CVE-2024-4040, a critical vulnerability in CrushFTP exploited in the wild. Organizations should patch urgently.

2 분 읽기

On April 19, 2024, CrushFTP, a managed file transfer vendor disclosed a 0day vulnerability in several versions of its software through a private mailing list. This severe vulnerability, identified as CVE-2024-4040 with a CVSS score of 9.8, was discovered by Simon Garrelou and assigned by a third-party CNA (DirectCyber) on April 22. The vulnerability affects versions prior to 10.7.1 and 11.1.0, including older 9.x versions. Initially and temporarily identified by Wiz as CVE-WIZ-003 before the official CVE assignment, CrushFTP described the vulnerability as one allowing remote attackers with limited privileges to bypass the VFS sandbox and access files outside their designated limits. However, researchers have since been able to exploit the vulnerability to achieve unauthenticated remote code execution, demonstrating that the flaw is more severe than initially described, and thereby raising its CVSS score from 7.7 to 9.8. As the vulnerability has been observed being exploited in the wild, users are strongly advised to update to the patched versions to secure their systems. 

What is CVE-2024-4040? 

The public advisory from CrushFTP describes CVE-2024-4040 as a VFS sandbox escape that permits low-privileged remote attackers to read files beyond the intended limits of the VFS Sandbox in its file transfer software. Researchers further analyzed the vulnerability and concluded that it can be exploited without authentication and with minimal technical effort, allowing attackers not only to read files at the root level but also to bypass authentication mechanisms for administrator accounts and execute code remotely. Although officially recorded as an arbitrary file read, the vulnerability might be more accurately termed as a server-side template injection (SSTI). The vulnerability has also been observed being exploited in the wild by threat actors. 

It is important to note that the CVE is only exploitable from the web interface port, so setups that only expose the SFTP port are considered safe. 

Wiz Research data: what’s the risk to cloud environments? 

According to Wiz data, 1.7% of cloud environments have instances vulnerable to CVE-2024-4040, and about 0.4% of environments have instances using CrushFTP exposed to the internet.  

What sort of exploitation has been identified in the wild?  

Researchers have observed exploitation attempts in the wild and a proof of concept has been published that demonstrates sandbox escape

Which products are affected? 

CrushFTP in versions 9.x before 10.7.1 and 11.0 before 11.1.0 are vulnerable to CVE-2024-4040.  

Which actions should security teams take? 

It is advised to upgrade to versions 10.7.1 or 11.1.0. In early versions of CrushFTP’s advisory it was mentioned that using a DMZ could protect users from exploitation, but this guidance has since been retracted.  

Wiz customers can use the pre-built query and advisory in the Wiz Threat Center to search for vulnerable instances in their environment. 

References 

계속 읽기

맞춤형 데모 받기

맞춤형 데모 신청하기

“내가 본 최고의 사용자 경험은 클라우드 워크로드에 대한 완전한 가시성을 제공합니다.”
데이비드 에슬릭최고정보책임자(CISO)
“Wiz는 클라우드 환경에서 무슨 일이 일어나고 있는지 볼 수 있는 단일 창을 제공합니다.”
아담 플레처최고 보안 책임자(CSO)
“우리는 Wiz가 무언가를 중요한 것으로 식별하면 실제로 중요하다는 것을 알고 있습니다.”
그렉 포니아토프스키위협 및 취약성 관리 책임자