CVE-2022-29620
FileZilla FTP Client vulnerability analysis and mitigation

Overview

FileZilla v3.59.0 contains a vulnerability that allows attackers to obtain cleartext passwords of connected SSH or FTP servers through memory dumps. This vulnerability was assigned CVE-2022-29620 and was discovered in April 2022. However, it's worth noting that this vulnerability is disputed, as the vendor does not consider it a security issue (MITRE CVE).

Technical details

The vulnerability is classified as CWE-316: Cleartext Storage of Sensitive Information in Memory. When users connect to FTP or SFTP servers using FileZilla, their authentication credentials are stored in memory without encryption or protection. The credentials remain in memory in a predictable sequence format (IP -> Password), making them easily extractable through memory dumps. The memory address of stored credentials changes with each new connection or application restart, but the credentials remain discoverable within the string data (WhichBuffer Blog).

Impact

The vulnerability could lead to the compromise of user credentials and potentially allow unauthorized access to remote servers. This is particularly concerning for SFTP connections, as compromised credentials could be used to access remote servers via SSH protocol. The impact is significant when attackers gain access to a system where FileZilla is running with active connections (WhichBuffer Blog).

Mitigation and workarounds

Recommended mitigations include disabling memory dumps, avoiding storage of sensitive data beyond its time of use, encrypting sensitive data before storage, and securely erasing sensitive data from memory. Users should also avoid storing sensitive data in plaintext, either on disk or in memory (WhichBuffer Blog).

Additional resources


SourceThis report was generated using AI

Related FileZilla FTP Client vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2016-15003HIGH7.8
  • FileZilla FTP ClientFileZilla FTP Client
  • cpe:2.3:a:filezilla-project:filezilla_client
NoYesJul 18, 2022
CVE-2019-5429HIGH7.8
  • FileZilla FTP ClientFileZilla FTP Client
  • net-ftp/filezilla
NoYesApr 29, 2019
CVE-2022-29620MEDIUM6.5
  • FileZilla FTP ClientFileZilla FTP Client
  • cpe:2.3:a:filezilla-project:filezilla_client
NoYesJun 07, 2022
CVE-2024-31497MEDIUM5.9
  • NixOSNixOS
  • libfilezilla-debugsource
NoYesApr 15, 2024
CVE-2023-48795MEDIUM5.9
  • PythonPython
  • criu-libs
NoYesDec 18, 2023

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management