Advisory

Here we go again: Progress reports maximum severity vulnerability in WS_FTP Server

Take action: If you are using WS_FTP server, start patching URGENTLY. If you can't patch immediately disable the Ad Hoc Transfer Module, and still patch as soon as possible. WS_FTP is very widely used and much loved program that will be exploited immediately (if it hasn't already).


Learn More

Progress Software, the company responsible for the MOVEit Transfer file-sharing platform exploited in recent data theft attacks, has issued a warning to its customers regarding a critical vulnerability in its WS_FTP Server software.

WS_FTP is widely used for secure file transfers in enterprise IT teams globally. The advisory revealed multiple vulnerabilities affecting the software's manager interface and Ad Hoc Transfer Module, with two critical flaws highlighted:.

  • CVE-2023-40044 (CVSS Score of 10/10) could enable unauthenticated attackers to execute remote commands through a .NET deserialization vulnerability in the Ad Hoc Transfer module.
  • CVE-2023-42657 (CVSS score of 9.9) is a directory traversal flaw, allowing attackers to perform file operations outside the authorized WS_FTP folder path, potentially manipulating files and folders on the underlying operating system.

The release contains three more High Severity vulnerabilities as well as three Medium Severity vulnerabilities.

Progress urged users to upgrade to the latest version (8.8.2) to address these vulnerabilities, emphasizing that this is the only way to remediate the issue, albeit causing an outage during the upgrade. They also provided guidance on disabling the vulnerable Ad Hoc Transfer Module if not in use.

Here we go again: Progress reports maximum severity vulnerability in WS_FTP Server