progress ws-ftp-server CVE-2023-40044 is a vulnerability in Progress Ws Ftp Server
Published on September 27, 2023

In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a pre-authenticated attacker could leverage a .NET deserialization vulnerability in the Ad Hoc Transfer module to execute remote commands on the underlying WS_FTP Server operating system.  

Vendor Advisory Vendor Advisory NVD

Known Exploited Vulnerability

This Progress WS_FTP Server Deserialization of Untrusted Data Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Progress WS_FTP Server contains a deserialization of untrusted data vulnerability in the Ad Hoc Transfer module that allows an authenticated attacker to execute remote commands on the underlying operating system.

The following remediation steps are recommended / required by October 26, 2023: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Vulnerability Analysis

CVE-2023-40044 is exploitable with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. It has an exploitability score of 2.8 out of four. The potential impact of an exploit of this vulnerability is considered to be very high.

What is a Marshaling, Unmarshaling Vulnerability?

The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.

CVE-2023-40044 has been classified to as a Marshaling, Unmarshaling vulnerability or weakness.


Products Associated with CVE-2023-40044

You can be notified by stack.watch whenever vulnerabilities like CVE-2023-40044 are published in these products:

 

What versions of Ws Ftp Server are vulnerable to CVE-2023-40044?