CVE-2024-0732: CWE-404 Denial of Service in PCMan FTP Server
A vulnerability was found in PCMan FTP Server 2.0.7 and classified as problematic. This issue affects some unknown processing of the component STOR Command Handler. The manipulation leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-251555.
AI Analysis
Technical Summary
CVE-2024-0732 is a medium-severity vulnerability affecting PCMan FTP Server version 2.0.7. The flaw resides in the STOR command handler component of the FTP server, which is responsible for handling file upload requests from clients. Specifically, the vulnerability is classified under CWE-404, indicating an improper resource shutdown or release issue. An attacker can remotely exploit this vulnerability without requiring authentication or user interaction by sending specially crafted STOR commands to the server. This manipulation causes the server to enter a denial-of-service (DoS) state, disrupting its availability and preventing legitimate users from uploading files or accessing FTP services. The CVSS v3.1 base score is 5.3, reflecting a network attack vector with low complexity, no privileges required, and no user interaction needed, but with impact limited to availability only. No patches or fixes have been publicly disclosed yet, and no known exploits are currently observed in the wild. However, the public disclosure of the vulnerability details increases the risk of future exploitation attempts. The vulnerability affects only version 2.0.7 of PCMan FTP Server, which is a lightweight FTP server software commonly used in small to medium business environments and by individual administrators for file transfer services.
Potential Impact
For European organizations, the primary impact of CVE-2024-0732 is service disruption due to denial of service on FTP servers running the vulnerable PCMan FTP Server 2.0.7. Organizations relying on this FTP server for critical file transfer operations could experience downtime, loss of productivity, and potential delays in business processes. While the vulnerability does not compromise confidentiality or integrity, the availability impact can affect sectors where timely file exchange is essential, such as manufacturing, logistics, and financial services. Additionally, disruption of FTP services could indirectly impact compliance with data handling policies if file transfers are delayed or interrupted. Since the exploit requires no authentication and can be initiated remotely, attackers could target exposed FTP servers over the internet, increasing the risk for organizations with publicly accessible FTP endpoints. The lack of a patch means organizations must rely on mitigation strategies until an official fix is released.
Mitigation Recommendations
European organizations should immediately audit their network to identify any instances of PCMan FTP Server version 2.0.7 in use, especially those exposed to the internet. If found, organizations should consider the following specific mitigations: 1) Temporarily disable or restrict access to the vulnerable FTP servers using firewall rules or network segmentation to limit exposure to trusted IP addresses only. 2) Replace or upgrade the FTP server software to a more secure and actively maintained alternative if an official patch is not yet available. 3) Monitor FTP server logs for unusual or malformed STOR command requests that could indicate exploitation attempts. 4) Implement intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect abnormal FTP traffic patterns related to this vulnerability. 5) Consider migrating critical file transfer operations to more secure protocols such as SFTP or FTPS, which provide encryption and stronger authentication mechanisms. 6) Establish incident response procedures to quickly isolate and remediate affected systems if a DoS attack is detected. These targeted actions go beyond generic advice by focusing on exposure reduction, monitoring, and alternative secure file transfer methods.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2024-0732: CWE-404 Denial of Service in PCMan FTP Server
Description
A vulnerability was found in PCMan FTP Server 2.0.7 and classified as problematic. This issue affects some unknown processing of the component STOR Command Handler. The manipulation leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-251555.
AI-Powered Analysis
Technical Analysis
CVE-2024-0732 is a medium-severity vulnerability affecting PCMan FTP Server version 2.0.7. The flaw resides in the STOR command handler component of the FTP server, which is responsible for handling file upload requests from clients. Specifically, the vulnerability is classified under CWE-404, indicating an improper resource shutdown or release issue. An attacker can remotely exploit this vulnerability without requiring authentication or user interaction by sending specially crafted STOR commands to the server. This manipulation causes the server to enter a denial-of-service (DoS) state, disrupting its availability and preventing legitimate users from uploading files or accessing FTP services. The CVSS v3.1 base score is 5.3, reflecting a network attack vector with low complexity, no privileges required, and no user interaction needed, but with impact limited to availability only. No patches or fixes have been publicly disclosed yet, and no known exploits are currently observed in the wild. However, the public disclosure of the vulnerability details increases the risk of future exploitation attempts. The vulnerability affects only version 2.0.7 of PCMan FTP Server, which is a lightweight FTP server software commonly used in small to medium business environments and by individual administrators for file transfer services.
Potential Impact
For European organizations, the primary impact of CVE-2024-0732 is service disruption due to denial of service on FTP servers running the vulnerable PCMan FTP Server 2.0.7. Organizations relying on this FTP server for critical file transfer operations could experience downtime, loss of productivity, and potential delays in business processes. While the vulnerability does not compromise confidentiality or integrity, the availability impact can affect sectors where timely file exchange is essential, such as manufacturing, logistics, and financial services. Additionally, disruption of FTP services could indirectly impact compliance with data handling policies if file transfers are delayed or interrupted. Since the exploit requires no authentication and can be initiated remotely, attackers could target exposed FTP servers over the internet, increasing the risk for organizations with publicly accessible FTP endpoints. The lack of a patch means organizations must rely on mitigation strategies until an official fix is released.
Mitigation Recommendations
European organizations should immediately audit their network to identify any instances of PCMan FTP Server version 2.0.7 in use, especially those exposed to the internet. If found, organizations should consider the following specific mitigations: 1) Temporarily disable or restrict access to the vulnerable FTP servers using firewall rules or network segmentation to limit exposure to trusted IP addresses only. 2) Replace or upgrade the FTP server software to a more secure and actively maintained alternative if an official patch is not yet available. 3) Monitor FTP server logs for unusual or malformed STOR command requests that could indicate exploitation attempts. 4) Implement intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect abnormal FTP traffic patterns related to this vulnerability. 5) Consider migrating critical file transfer operations to more secure protocols such as SFTP or FTPS, which provide encryption and stronger authentication mechanisms. 6) Establish incident response procedures to quickly isolate and remediate affected systems if a DoS attack is detected. These targeted actions go beyond generic advice by focusing on exposure reduction, monitoring, and alternative secure file transfer methods.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-19T11:17:43.453Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9817c4522896dcbd78cb
Added to database: 5/21/2025, 9:08:39 AM
Last enriched: 7/5/2025, 2:10:36 AM
Last updated: 7/28/2025, 8:11:29 AM
Views: 12
Related Threats
CVE-2025-8935: SQL Injection in 1000 Projects Sales Management System
MediumCVE-2025-8934: Cross Site Scripting in 1000 Projects Sales Management System
MediumCVE-2025-8933: Cross Site Scripting in 1000 Projects Sales Management System
MediumCVE-2025-8932: SQL Injection in 1000 Projects Sales Management System
MediumCVE-2025-8931: SQL Injection in code-projects Medical Store Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.