October 30 Advisory: Xlight FTP Server Flaw [CVE-2024-46483]

Rapid Response

Date of Disclosure: October 22, 2024

CVE-2024-46483 is an integer overflow vulnerability in the packet parsing logic of the Xlight SFTP server, which can lead to a heap overflow with attacker-controlled content. The vulnerability is currently awaiting analysis from NVD, but an existing proof of concept is available on GitHub, raising the likelihood that we will observe exploitation of this vulnerability. 

Xlight FTP Server is a lightweight FTP (File Transfer Protocol) server designed primarily for Windows platforms for centralized file sharing and management. Typically, businesses or organizations use FTP servers like Xlight to manage files securely, automate backups, or facilitate data exchanges between departments.

Xlight FTP Server is accessible over the public internet, but typically requires specific configurations to ensure security. Exposed instances of Xlight FTP Server without proper safeguards can increase the risk of exploitation. Users of Xlight FTP Server versions <= 3.9.4.2 are urged to update to the latest version immediately. Note the following key distinction between the 32-bit and 64-bit versions of Xlight:

  • 32-bit Versions: Attackers can overwrite critical data structures on the heap, potentially leading to code execution.
  • 64-bit Versions: While code execution is less likely on 64-bit systems, the vulnerability still allows for crashes, resulting in denial of service.

Organizations with public-facing Xlight FTP Server instances should check for indicators of compromise as soon as possible. See the provided Censys queries below to help track exposures. It’s recommended to avoid the exposure of network device admin portals on the public internet. 

FieldDetails
CVE-IDCVE-2024-46483  – CVSS 9.8 (Critical) assigned by CISA-ADP
Vulnerability DescriptionInteger overflow vulnerability in the packet parsing logic of the SFTP server, which can lead to a heap overflow with attacker-controlled content.
Date of DisclosureOctober 22, 2024
Affected AssetsXlight FTP Server – particularly the 32-bit version
Vulnerable Software Versions <3.9.4.3
PoC Available?Yes, a PoC is available on GitHub
Exploitation StatusAt the time of writing, active exploitation of this vulnerability was not reported by CISA or Greynoise. 
Patch StatusUsers of Xlight versions 3.9.4.2 and earlier are strongly urged to update to the latest version immediately. The vendor has addressed this vulnerability in subsequent releases.

Censys Perspective

At the time of writing, Censys observed 3,520 exposed Xlight FTP Servers online, with about 32% concentrated in China. Censys observed about 9% of the exposed instances to be associated with Alibaba Cloud (ASN 37963). 

Roughly half of these exposed servers were publicly leaking their versions, and we discovered that 45% of all exposures showed indications of running a vulnerable version (anything below 3.9.4.3).

Vulnerable?HostsProportion of Total
UNKNOWN188553.55%
FALSE401.14%
TRUE159545.31%
Total3520100.00%

We only observed 40 servers running versions 3.9.4.3 or newer.

Map of exposed Xlight FTP Server instances:

To identify all exposed Xlight FTP Server instances on your network regardless of version, the following Censys queries can be used:

Censys Search Query:

services.ftp.banner:"Xlight" OR services.banner:"*xlight*ftp*"  OR services.ssh.endpoint_id.raw:"*Xlight FTP*" OR services.banner:"*xlight*server"

Censys ASM Query:

host.services.ftp.banner:"Xlight" or host.services.banner:"*xlight*ftp*" or  host.services.ssh.endpoint_id.raw:"*Xlight FTP*" or host.services.banner:"*xlight*server"

References