First published: Wed Aug 28 2024(Updated: )
In WS_FTP Server versions before 8.8.8 (2022.0.8), a Missing Critical Step in Multi-Factor Authentication of the Web Transfer Module allows users to skip the second-factor verification and log in with username and password only.
Credit: security@progress.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ipswitch WS FTP Server | <8.8.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7745 is rated as a high severity vulnerability due to the potential for unauthorized access.
To fix CVE-2024-7745, upgrade to WS_FTP Server version 8.8.8 or later.
CVE-2024-7745 allows attackers to bypass multi-factor authentication and access the system with just a username and password.
CVE-2024-7745 affects all versions of WS_FTP Server prior to 8.8.8.
No, CVE-2024-7745 reveals a flaw in the multi-factor authentication implementation that allows users to log in without the second factor.