Critical Pre-Authentication Flaw in Progress Software’s WS_FTP Server Exploited in the Wild

Just days after the release of patches for a critical pre-authentication flaw in Progress Software’s WS_FTP server product, security experts have detected active exploitation in the wild against multiple target environments. Cybersecurity vendor Rapid7 raised the alarm over the weekend after it spotted instances of live exploitation of the WS_FTP vulnerability in various customer environments.

Overview of CVE-2023-40044 Vulnerability

The easy-to-exploit CVE-2023-40044 vulnerability is already in the crosshairs of attackers attempting mass exploitation of vulnerable WS_FTP servers. This critical-severity flaw, carrying a CVSS score of 10/10, can be triggered by attackers over the internet and affects all WS_FTP Server versions prior to 8.7.4 and 8.8.2.

Affected Versions and Components

The flaw affects the entire Ad Hoc Transfer component of WS_FTP. It allows attackers to exploit the vulnerability without any authentication, which was a shocking discovery made by the research outfit Assetnote, which initially found the issue.

Discovery and Shocking Findings

Assetnote, the research outfit that discovered the vulnerability, expressed their surprise at being able to reach the deserialization sink without any authentication. This finding highlights the severity and urgency in addressing the flaw as it exposes systems to potential compromise.

Scope of Exposure

Assetnote has identified nearly 3,000 hosts running WS_FTP with exposed web servers. Notably, most of these exposed assets belong to large enterprises, governments, and educational institutions. The extensive exposure poses a serious threat, potentially leading to unauthorized access and further exploitation.

Progress Software’s Security Response Challenges

Progress Software’s security response team finds itself scrambling to respond to a wave of debilitating ransomware attacks that exploit zero-day flaws in its MOVEit managed file transfer software product. This recent spate of attacks highlights the increasing importance of diligent patching and proactive security measures to protect against potential exploits.

Earlier this year, the company rushed out patches to cover at least three critical vulnerabilities and announced plans to release regular service packs. These service packs aim to provide a predictable, simple, and transparent process for product and security fixes. By regularly updating their software, Progress Software can more effectively address emerging vulnerabilities and protect their customers.

Definition of Service Packs

Software vendors typically use a service pack to deliver a collection of updates, fixes, features, or enhancements to an application. These packs consolidate all necessary software revisions into a comprehensive package, simplifying the patching process for users and ensuring they have the latest security measures in place.

The active exploitation of a critical pre-authentication flaw in Progress Software’s WS_FTP server product highlights the urgency for organizations to promptly apply patches and bolster their security measures. With attackers actively targeting vulnerable systems, the potential for unauthorized access and exploitation is significant. Combined efforts from security researchers, vendors, and IT administrators are necessary to mitigate the risks posed by such vulnerabilities. It is crucial that organizations regularly update their software and remain vigilant in their cybersecurity practices to defend against emerging threats.

Explore more

Strategies for Navigating the Shift to 6G Without Vendor Lock-In

The global telecommunications landscape is currently standing at a crossroads where the promise of near-instantaneous connectivity meets the sobering reality of complex architectural transitions. As enterprises begin to look beyond the current capabilities of 5G-Advanced, the move toward 6G is being framed not merely as an incremental boost in peak data rates but as a fundamental reimagining of what a

How Do You Choose the Best Wi-Fi Router in 2026?

Modern households and professional home offices now rely on wireless networking as the invisible backbone of daily existence, making the selection of a router one of the most consequential technology decisions a consumer can face. The current digital landscape is defined by an intricate web of high-bandwidth activities, ranging from immersive virtual reality meetings to the constant telemetry of dozens

Hotels Must Bolster Cybersecurity to Protect Guest Data

The digital transformation of the global hospitality industry has fundamentally altered the relationship between hotels and their guests, turning data protection into a cornerstone of operational integrity. As properties transition into digital-first enterprises, the safeguarding of guest information has evolved from a niche IT task into a vital pillar of brand reputation. This shift is driven by the reality that

How Do Instant Payments Reshape Global Business Standards?

The traditional three-day settlement cycle that once governed global commerce has effectively dissolved into a relic of financial history as real-time payment systems become the universal benchmark for corporate operations. In the current economic landscape of 2026, the speed of capital movement has finally synchronized with the speed of digital information, creating a paradigm where instantaneous transaction finality is no

Can China Dominate the Global 6G Technology Market?

The global telecommunications landscape is currently witnessing a seismic shift as China officially accelerates its pursuit of next-generation connectivity through the approval of expansive field trials and technical standardization protocols for 6G technology. This strategic move, recently sanctioned by the Ministry of Industry and Information Technology, specifically greenlights the extensive use of the 6 GHz frequency band for intensive regional