Cybersecurity Threat Report for 2025: Part 2 – This Research Report is all you need to stay updated.

CVE-2025-54309

CVE-2025-54309 Unpacked: How a Validation Bug Led to Remote Admin Takeover in CrushFTP

Vulnerability Overview 

CVE ID: CVE-2025-54309 

CVE Title: CrushFTP AS2 Validation Flaw Leading to Admin Takeover 

Severity: Critical  

Exploit Status: Actively exploited in the wild 

Business Risk: Complete administrative control of file transfer servers, enabling data theft, user account creation, lateral movement, and disruption of critical business operations.  

Compliance Impact: Exposure of regulated data handled in file transfer environments, with potential violations of standards such as GDPR, HIPAA, and PCI-DSS.

Summary

CVE-2025-54309 is a critical vulnerability in CrushFTP (versions before 10.8.5 and 11.3.4_23) caused by weak AS2 validation when the DMZ proxy is not used. Exploited in the wild since July 18, 2025, it allows attackers to gain full admin control over HTTPS, create accounts, change settings, and steal sensitive data. Thousands of servers are still exposed, and CISA has added it to the Known Exploited Vulnerabilities catalog. The flaw is fixed in versions 10.8.5_12 and 11.3.4_26, so urgent patching and log reviews are advised to avoid compromise.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2025-54309?

Technical Overview

How Does the CVE-2025-54309 Exploit Work?

The attack typically follows these steps:

How Does the CVE-2025-54309 Exploit Work

What Causes CVE-2025-54309?

Vulnerability Root Cause:  

This flaw arises from incorrect handling of AS2 validation in CrushFTP. Without the DMZ proxy, the server misses security checks, letting attackers use crafted requests to gain admin access over HTTPS.

How Can You Mitigate CVE-2025-54309?

If immediate patching is delayed or not possible:  

  • Restrict exposure of CrushFTP instances to trusted networks only. 
  • Disable or limit external access wherever possible. 
  • Closely monitor logs for unusual HTTPS activity targeting AS2 validation. 

Will Patching CVE-2025-54309 Cause Downtime?

Patch application impact: Low. Updating to CrushFTP 10.8.5_12 or 11.3.4_26 addresses the flaw. The update process involves a standard server upgrade with minimal downtime. Regular deployments should not face significant disruption.

How Can You Detect CVE-2025-54309 Exploitation?

Exploitation Signatures:

Look for HTTPS requests exploiting AS2 validation flaws in CrushFTP. Malicious requests may attempt to bypass normal security checks when the DMZ proxy is not enabled.

MITRE ATT&CK Mapping:

Indicators of Compromise (IOCs/IOAs):

Behavioral Indicators:

Alerting Strategy:

Remediation & Response

Patch/Upgrade Instructions:

Mitigation Steps if No Patch:

Enable the DMZ proxy workaround if patching cannot be applied immediately.

Rollback Plan:

If issues occur after upgrading, revert to the previously stable CrushFTP version and keep the DMZ proxy workaround active until patching is re-applied.

Incident Response Considerations:

Compliance & Governance Notes

Standards Impacted:

Audit Trail Requirement:

Policy Alignment:

CVSS Breakdown Table

MetricValue Description
Base Score9.8Critical severity indicating severe impact and easy exploitability
Attack VectorNetworkVulnerability can be exploited remotely over HTTP/HTTPS
Attack ComplexityLowExploitation does not need special conditions
Privileges RequiredNoneNo authentication or prior access is necessary
User Interaction NoneNo user involvement is needed to trigger the flaw
Scope UnChanged Only the affected CrushFTP component is impacted
Confidentiality Impact HighExploitation can reveal sensitive data
Integrity ImpactHighExploitation can allow changes or bypass security checks
Availability ImpactHighExploitation can disrupt or disable CrushFTP services

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.