Skip to main content

CVE-2024-0693: CWE-404 Denial of Service in EFS Easy File Sharing FTP

Medium
VulnerabilityCVE-2024-0693cvecve-2024-0693cwe-404
Published: Thu Jan 18 2024 (01/18/2024, 22:31:04 UTC)
Source: CVE Database V5
Vendor/Project: EFS
Product: Easy File Sharing FTP

Description

A vulnerability classified as problematic was found in EFS Easy File Sharing FTP 2.0. Affected by this vulnerability is an unknown functionality. The manipulation of the argument username leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-251479. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/03/2025, 17:00:44 UTC

Technical Analysis

CVE-2024-0693 is a medium-severity vulnerability identified in EFS Easy File Sharing FTP version 2.0. The vulnerability is classified under CWE-404, which pertains to improper resource shutdown or release, leading to a denial of service (DoS) condition. Specifically, the flaw arises from improper handling of the 'username' argument in the FTP service. An attacker can remotely manipulate this argument without requiring authentication or user interaction, causing the FTP server to crash or become unresponsive, thereby denying legitimate users access to the service. The vulnerability is exploitable over the network (AV:N) with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The scope is unchanged (S:U), and the impact is limited to availability (A:L) with no confidentiality or integrity impact. The vendor was contacted but did not respond, and no patches or mitigations have been published at this time. Although no known exploits are currently observed in the wild, public disclosure of the exploit code increases the risk of exploitation. The vulnerability affects only version 2.0 of the product, which is a lightweight FTP server solution primarily used for easy file sharing in small to medium environments. The lack of vendor response and absence of patches necessitate proactive defensive measures by users of this software.

Potential Impact

For European organizations using EFS Easy File Sharing FTP 2.0, this vulnerability poses a risk of service disruption due to denial of service attacks. FTP servers often facilitate critical file transfers and data exchange; thus, an attacker exploiting this flaw could interrupt business operations, delay workflows, and potentially impact dependent services. While the vulnerability does not compromise data confidentiality or integrity, the availability impact can affect operational continuity, especially in sectors relying on FTP for automated or scheduled file transfers. Organizations in industries such as manufacturing, logistics, and small to medium enterprises (SMEs) that use this FTP server for internal or external file sharing could experience downtime. Additionally, the ease of exploitation without authentication or user interaction means attackers can launch attacks remotely with minimal effort, increasing the threat surface. The absence of vendor patches means organizations must rely on network-level controls and alternative mitigations to reduce exposure.

Mitigation Recommendations

Given the lack of official patches, European organizations should implement the following specific mitigations: 1) Immediately restrict external network access to the EFS Easy File Sharing FTP server by applying firewall rules to limit connections only to trusted IP addresses or internal networks. 2) Employ intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect anomalous FTP username argument patterns that could trigger the DoS. 3) Consider disabling or replacing the EFS Easy File Sharing FTP server with a more secure and actively maintained FTP solution that has no known vulnerabilities. 4) Monitor FTP server logs closely for unusual connection attempts or crashes indicative of exploitation attempts. 5) If possible, isolate the FTP server in a segmented network zone to contain potential impact. 6) Implement rate limiting on FTP connections to reduce the risk of automated exploitation attempts. 7) Maintain regular backups and ensure rapid recovery procedures are in place to minimize downtime in case of successful DoS attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-18T17:04:24.484Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683dbfa6182aa0cae249830e

Added to database: 6/2/2025, 3:13:42 PM

Last enriched: 7/3/2025, 5:00:44 PM

Last updated: 7/26/2025, 7:01:35 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats