← Back to CVEs
CVE-2024-4040
CRITICALCISA KEV9.8
Description
A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published4/22/2024
Last Modified2/26/2026
Sourcekev
Honeypot Sightings0
CISA KEV
VendorCrushFTP
ProductCrushFTP
Vulnerability NameCrushFTP VFS Sandbox Escape Vulnerability
KEV Date Added2024-04-24
Remediation Due Date2024-05-01
Ransomware UseUnknown
Affected Products
crushftp:crushftp
Weaknesses (CWE)
CWE-1336CWE-94
References
https://github.com/airbus-cert/CVE-2024-4040(430a6cef-dc26-47e3-9fa8-52fb7f19644e)
https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-exploited-zero-day-immediately/(430a6cef-dc26-47e3-9fa8-52fb7f19644e)
https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update(430a6cef-dc26-47e3-9fa8-52fb7f19644e)
https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update(430a6cef-dc26-47e3-9fa8-52fb7f19644e)
https://www.rapid7.com/blog/post/2024/04/23/etr-unauthenticated-crushftp-zero-day-enables-complete-server-compromise/(430a6cef-dc26-47e3-9fa8-52fb7f19644e)
https://www.reddit.com/r/crowdstrike/comments/1c88788/situational_awareness_20240419_crushftp_virtual/(430a6cef-dc26-47e3-9fa8-52fb7f19644e)
https://www.reddit.com/r/cybersecurity/comments/1c850i2/all_versions_of_crush_ftp_are_vulnerable/(430a6cef-dc26-47e3-9fa8-52fb7f19644e)
https://github.com/airbus-cert/CVE-2024-4040(af854a3a-2127-422b-91ae-364da2661108)
https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-exploited-zero-day-immediately/(af854a3a-2127-422b-91ae-364da2661108)
https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update(af854a3a-2127-422b-91ae-364da2661108)
https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update(af854a3a-2127-422b-91ae-364da2661108)
https://www.rapid7.com/blog/post/2024/04/23/etr-unauthenticated-crushftp-zero-day-enables-complete-server-compromise/(af854a3a-2127-422b-91ae-364da2661108)
https://www.reddit.com/r/crowdstrike/comments/1c88788/situational_awareness_20240419_crushftp_virtual/(af854a3a-2127-422b-91ae-364da2661108)
https://www.reddit.com/r/cybersecurity/comments/1c850i2/all_versions_of_crush_ftp_are_vulnerable/(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-4040(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.