CVE-2023-40044
WS_FTP Server Ad Hoc Transfer Module .NET Deserialization Vulnerability
CVSS Score
10.0
EPSS Score
0.0%
EPSS Percentile
0th
In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a pre-authenticated attacker could leverage a .NET deserialization vulnerability in the Ad Hoc Transfer module to execute remote commands on the underlying WS_FTP Server operating system.
| CWE | CWE-502 |
| Vendor | progress software corporation |
| Product | ws_ftp server |
| Published | Sep 27, 2023 |
| Last Updated | Oct 21, 2025 |
โ ๏ธ Actively Exploited โ Act Now
Get instant alerts for progress software corporation ws_ftp server
This vulnerability is actively exploited in the wild. Set up free real-time alerts so you're first to know about threats like CVE-2023-40044.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
Progress Software Corporation / WS_FTP Server
8.8.0 < 8.8.2 8.7.0 < 8.7.4
References
progress.com: https://www.progress.com/ws_ftp community.progress.com: https://community.progress.com/s/article/WS-FTP-Server-Critical-Vulnerability-September-2023 theregister.com: https://www.theregister.com/2023/10/02/ws_ftp_update/ rapid7.com: https://www.rapid7.com/blog/post/2023/09/29/etr-critical-vulnerabilities-in-ws_ftp-server/ attackerkb.com: https://attackerkb.com/topics/bn32f9sNax/cve-2023-40044 censys.com: https://censys.com/cve-2023-40044/ assetnote.io: https://www.assetnote.io/resources/research/rce-in-progress-ws-ftp-ad-hoc-via-iis-http-modules-cve-2023-40044 packetstormsecurity.com: http://packetstormsecurity.com/files/174917/Progress-Software-WS_FTP-Unauthenticated-Remote-Code-Execution.html cisa.gov: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-40044
Credits
Shubham Shah - Assetnote Sean Yeoh - Assetnote