CVE-2023-40044 is a vulnerability in Progress Ws Ftp Server
Published on September 27, 2023
In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a pre-authenticated attacker could leverage a .NET deserialization vulnerability in the Ad Hoc Transfer module to execute remote commands on the underlying WS_FTP Server operating system.
Known Exploited Vulnerability
This Progress WS_FTP Server Deserialization of Untrusted Data Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Progress WS_FTP Server contains a deserialization of untrusted data vulnerability in the Ad Hoc Transfer module that allows an authenticated attacker to execute remote commands on the underlying operating system.
The following remediation steps are recommended / required by October 26, 2023: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Vulnerability Analysis
CVE-2023-40044 is exploitable with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. It has an exploitability score of 2.8 out of four. The potential impact of an exploit of this vulnerability is considered to be very high.
What is a Marshaling, Unmarshaling Vulnerability?
The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.
CVE-2023-40044 has been classified to as a Marshaling, Unmarshaling vulnerability or weakness.
Products Associated with CVE-2023-40044
You can be notified by stack.watch whenever vulnerabilities like CVE-2023-40044 are published in these products:
What versions of Ws Ftp Server are vulnerable to CVE-2023-40044?
- Progress Ws Ftp Server Fixed in Version 8.7.4
- Progress Ws Ftp Server Version 8.8 Fixed in Version 8.8.2