← Zuruck zu CVEs
CVE-2023-40044
CRITICALCISA KEV10.0
Beschreibung
In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a pre-authenticated attacker could leverage a .NET deserialization vulnerability in the Ad Hoc Transfer module to execute remote commands on the underlying WS_FTP Server operating system.
CVE Details
CVSS v3.1 Bewertung10.0
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht9/27/2023
Zuletzt geandert10/31/2025
Quellekev
Honeypot-Sichtungen0
CISA KEV
HerstellerProgress
ProduktWS_FTP Server
SchwachstellennameProgress WS_FTP Server Deserialization of Untrusted Data Vulnerability
KEV Aufnahmedatum2023-10-05
Behebungsfrist2023-10-26
Ransomware-NutzungKnown
Betroffene Produkte
progress:ws_ftp_server
Schwachen (CWE)
CWE-502CWE-502
Referenzen
http://packetstormsecurity.com/files/174917/Progress-Software-WS_FTP-Unauthenticated-Remote-Code-Execution.html(security@progress.com)
https://attackerkb.com/topics/bn32f9sNax/cve-2023-40044(security@progress.com)
https://censys.com/cve-2023-40044/(security@progress.com)
https://community.progress.com/s/article/WS-FTP-Server-Critical-Vulnerability-September-2023(security@progress.com)
https://www.assetnote.io/resources/research/rce-in-progress-ws-ftp-ad-hoc-via-iis-http-modules-cve-2023-40044(security@progress.com)
https://www.progress.com/ws_ftp(security@progress.com)
https://www.rapid7.com/blog/post/2023/09/29/etr-critical-vulnerabilities-in-ws_ftp-server/(security@progress.com)
https://www.theregister.com/2023/10/02/ws_ftp_update/(security@progress.com)
http://packetstormsecurity.com/files/174917/Progress-Software-WS_FTP-Unauthenticated-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
https://attackerkb.com/topics/bn32f9sNax/cve-2023-40044(af854a3a-2127-422b-91ae-364da2661108)
https://censys.com/cve-2023-40044/(af854a3a-2127-422b-91ae-364da2661108)
https://community.progress.com/s/article/WS-FTP-Server-Critical-Vulnerability-September-2023(af854a3a-2127-422b-91ae-364da2661108)
https://www.assetnote.io/resources/research/rce-in-progress-ws-ftp-ad-hoc-via-iis-http-modules-cve-2023-40044(af854a3a-2127-422b-91ae-364da2661108)
https://www.progress.com/ws_ftp(af854a3a-2127-422b-91ae-364da2661108)
https://www.rapid7.com/blog/post/2023/09/29/etr-critical-vulnerabilities-in-ws_ftp-server/(af854a3a-2127-422b-91ae-364da2661108)
https://www.theregister.com/2023/10/02/ws_ftp_update/(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-40044(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.