In a recent development following the disclosure of the critical CVE-2023-40044 vulnerability in Progress Software’s WS_FTP Server, security researchers from Assetnote have released a proof-of-concept (PoC) exploit for this maximum severity remote code execution (RCE) flaw. This PoC exploit, published over the weekend, allows unauthenticated attackers to remotely execute commands on the affected systems by exploiting the .NET deserialization vulnerability within the Ad Hoc Transfer Module. Assetnote’s analysis has revealed that there are approximately 2.9k hosts on the internet running WS_FTP Server with their webservers exposed, primarily belonging to large enterprises, governments, and educational institutions.
The situation has taken a more concerning turn as cybersecurity company Rapid7 reported that attackers have already started exploiting CVE-2023-40044 in the wild. These incidents of exploitation were observed on Saturday evening, September 30, and Rapid7 suggests that the process execution chain appears consistent across these incidents, hinting at possible mass exploitation by a single threat actor. Furthermore, the utilization of the same Burpsuite domain across all these incidents adds to this suspicion.
In light of these recent developments, organizations are urged to act swiftly, either by upgrading to the recommended highest version, 8.8.2, or by disabling the vulnerable WS_FTP Server Ad Hoc Transfer Module if immediate patching is not feasible.