10 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
8.6 High
AI Score
Confidence
High
0.886 High
EPSS
Percentile
98.7%
In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a pre-authenticated attacker could leverage a .NET deserialization vulnerability in the Ad Hoc Transfer module to execute remote commands on the underlying WS_FTP Server operating system.
CPE | Name | Operator | Version |
---|---|---|---|
progress:ws_ftp_server | progress ws ftp server | lt | 8.7.4 |
progress:ws_ftp_server | progress ws ftp server | lt | 8.8.2 |
[
{
"defaultStatus": "affected",
"modules": [
"Ad Hoc Transfer Module"
],
"product": "WS_FTP Server",
"vendor": "Progress Software Corporation",
"versions": [
{
"lessThan": "8.8.2",
"status": "affected",
"version": "8.8.0",
"versionType": "semver"
},
{
"lessThan": "8.7.4",
"status": "affected",
"version": "8.7.0",
"versionType": "semver"
}
]
}
]
packetstormsecurity.com/files/174917/Progress-Software-WS_FTP-Unauthenticated-Remote-Code-Execution.html
attackerkb.com/topics/bn32f9sNax/cve-2023-40044
censys.com/cve-2023-40044/
community.progress.com/s/article/WS-FTP-Server-Critical-Vulnerability-September-2023
www.assetnote.io/resources/research/rce-in-progress-ws-ftp-ad-hoc-via-iis-http-modules-cve-2023-40044
www.progress.com/ws_ftp
www.rapid7.com/blog/post/2023/09/29/etr-critical-vulnerabilities-in-ws_ftp-server/
www.theregister.com/2023/10/02/ws_ftp_update/
More
10 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
8.6 High
AI Score
Confidence
High
0.886 High
EPSS
Percentile
98.7%