CISA Flags Wing FTP Server Flaw as Actively Exploited in Attacks

Related

New Data Leak Site Uncovered Linked to Active Initial Access Broker

What happened Researchers uncovered a new Tor-based data leak site...

Trio-Tech Discloses Ransomware Attack Impacting Semiconductor Operations

What happened Trio-Tech International disclosed a ransomware attack affecting its...

Kaplan Data Breach Notification Follows Hack Exposing Personal Information

What happened Kaplan North America began notifying individuals of a...

Female Cybersecurity Leaders to Watch in Virginia

Virginia’s cybersecurity bench is shaped by a rare mix...

Hacker Breaches Resolv DeFi Platform, Steals $24.5 Million in Crypto

What happened A cyberattack on decentralized finance platform Resolv allowed...

Share

What happened

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned that a vulnerability in Wing FTP Server is being actively exploited and added it to its Known Exploited Vulnerabilities catalog, requiring federal agencies to take immediate action. The flaw involves improper handling of input in the web authentication process, which can expose sensitive information and be chained with other vulnerabilities, including a critical remote code execution issue, to compromise systems. The affected versions were patched in Wing FTP Server 7.4.4, but unpatched systems remain vulnerable to attacks that could lead to data exposure or full system takeover. 

Who is affected

Organizations running vulnerable versions of Wing FTP Server, particularly internet-exposed systems, are affected, as attackers can exploit the flaw to access sensitive data or escalate attacks on compromised servers. 

Why CISOs should care

The vulnerability is actively exploited and affects file transfer infrastructure, which often handles sensitive data, making it a high-risk entry point for attackers seeking initial access or deeper system compromise. 

3 practical actions

  1. Apply security updates immediately. Upgrade to Wing FTP Server 7.4.4 or later to remediate the vulnerability. 
  2. Restrict exposure of FTP services. Limit access to trusted networks and disable unnecessary public-facing interfaces. 
  3. Monitor for signs of exploitation. Review logs and system activity for abnormal authentication behavior or data access attempts. 

For more updates on federal cybersecurity advisories and directives, explore our coverage under the CISA tag.