Skip to main content

CVE-2023-38960: n/a in n/a

High
VulnerabilityCVE-2023-38960cvecve-2023-38960
Published: Tue Feb 13 2024 (02/13/2024, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Insecure Permissions issue in Raiden Professional Server RaidenFTPD v.2.4 build 4005 allows a local attacker to gain privileges and execute arbitrary code via crafted executable running from the installation directory.

AI-Powered Analysis

AILast updated: 07/05/2025, 08:11:00 UTC

Technical Analysis

CVE-2023-38960 is a high-severity vulnerability affecting RaidenFTPD Professional Server version 2.4 build 4005. The issue stems from insecure permissions set on the installation directory, which allows a local attacker with limited privileges to execute arbitrary code with elevated privileges. Specifically, the vulnerability arises because the installation directory permits execution of crafted executables placed by an attacker. This means that if an attacker can gain local access to the system, even with restricted user rights, they can place a malicious executable in the RaidenFTPD installation directory and trigger its execution, thereby escalating their privileges and potentially taking full control of the affected system. The vulnerability is classified under CWE-276 (Incorrect Default Permissions), indicating that the root cause is improper permission settings that do not sufficiently restrict write or execute access to sensitive directories. The CVSS v3.1 base score is 7.3, reflecting a high impact on confidentiality, integrity, and availability. The attack vector is local (AV:L), requiring the attacker to have some level of access to the system, with low attack complexity (AC:L), requiring limited privileges (PR:L), and user interaction is required (UI:R). The scope remains unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits are reported in the wild yet, and no patches are currently linked, indicating that organizations should prioritize mitigation and monitoring. This vulnerability is particularly dangerous in environments where RaidenFTPD is used on multi-user systems or servers accessible by multiple users, as it can allow privilege escalation from a low-privilege user to administrative control.

Potential Impact

For European organizations, the impact of CVE-2023-38960 can be significant, especially in sectors relying on legacy or specialized FTP server software like RaidenFTPD. Organizations using this software in shared environments or on servers with multiple users face a risk of local privilege escalation, potentially leading to full system compromise. This can result in unauthorized access to sensitive data, disruption of services, and potential lateral movement within networks. Given the high confidentiality, integrity, and availability impacts, attackers could exfiltrate data, modify or delete critical files, or disrupt operations. In regulated industries such as finance, healthcare, and critical infrastructure within Europe, such a compromise could lead to severe compliance violations under GDPR and other data protection laws, resulting in legal and financial penalties. Additionally, the requirement for local access limits remote exploitation but does not eliminate risk, as attackers may gain initial footholds through phishing or other means and then exploit this vulnerability to escalate privileges. The lack of available patches necessitates immediate attention to alternative mitigations to prevent exploitation.

Mitigation Recommendations

To mitigate CVE-2023-38960, European organizations should first audit the permissions of the RaidenFTPD installation directory and ensure that only trusted administrative users have write and execute permissions. Restrict directory permissions to prevent non-privileged users from adding or modifying executables. Implement strict access controls and user account management to minimize the number of users with local access to the server. Employ application whitelisting to prevent execution of unauthorized binaries in the installation directory. Monitor file system changes within the RaidenFTPD directory using host-based intrusion detection systems (HIDS) to detect suspicious activity. If possible, isolate the FTP server on dedicated hardware or virtual machines with minimal user access. Regularly review user privileges and remove unnecessary accounts. Since no official patch is currently available, organizations should consider disabling or replacing RaidenFTPD with more secure, actively maintained FTP server software. Additionally, implement robust logging and alerting to detect any attempts at privilege escalation. Finally, educate users about the risks of local access and enforce strong endpoint security policies to reduce the likelihood of initial compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-07-25T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd8a03

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 8:11:00 AM

Last updated: 8/12/2025, 10:19:05 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats