The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-47865

CVE-2021-47865: ProFTPD 1.3.7a DoS Vulnerability

CVE-2021-47865 is a denial of service vulnerability in ProFTPD 1.3.7a where attackers overwhelm the server with multiple simultaneous FTP connections. This article covers technical details, impact, and mitigation.

Published: January 23, 2026

CVE-2021-47865 Overview

CVE-2021-47865 is a denial of service vulnerability affecting ProFTPD 1.3.7a that allows remote attackers to overwhelm the FTP server by creating multiple simultaneous connections. By repeatedly establishing connections using threading techniques, attackers can exhaust server connection limits and effectively block legitimate user access to FTP services.

Critical Impact

Remote attackers can disrupt FTP service availability without authentication, preventing legitimate users from accessing critical file transfer services.

Affected Products

  • ProFTPD 1.3.7a

Discovery Timeline

  • 2026-01-21 - CVE-2021-47865 published to NVD
  • 2026-01-21 - Last updated in NVD database

Technical Details for CVE-2021-47865

Vulnerability Analysis

This vulnerability is classified under CWE-770 (Allocation of Resources Without Limits or Throttling). The core issue stems from ProFTPD's inadequate handling of concurrent connection requests, allowing malicious actors to consume all available connection slots through rapid, automated connection attempts.

The attack is network-accessible and requires no authentication or user interaction, making it particularly dangerous for internet-facing FTP servers. An attacker can leverage simple threading mechanisms to initiate numerous parallel connections, overwhelming the server's capacity to handle legitimate traffic.

The vulnerability specifically impacts service availability. While data confidentiality and integrity remain unaffected, the ability to render an FTP server completely unresponsive poses significant operational risks, particularly for organizations relying on FTP for critical file transfer operations.

Root Cause

The root cause of this vulnerability lies in ProFTPD's failure to implement proper resource allocation limits and throttling mechanisms for incoming connections. The server does not adequately restrict the rate at which new connections can be established from a single source, nor does it implement effective mechanisms to detect and mitigate connection flooding patterns.

This represents a classic resource exhaustion scenario where the server's finite connection pool can be depleted by a single malicious actor before legitimate users can establish their connections.

Attack Vector

The attack leverages network-based connection flooding targeting the FTP service port (typically port 21). An attacker initiates multiple concurrent TCP connections to the ProFTPD server using threading or multiprocessing techniques. Each connection consumes a slot in the server's connection pool until the maximum limit is reached.

Once all connection slots are exhausted, the server cannot accept new connections from any client, including legitimate users. The attacker can maintain this denial of service condition by keeping connections alive or continuously cycling through new connection attempts as old ones time out.

The attack requires no authentication and can be launched from a single host, though distributed attacks from multiple sources would be even more effective and harder to mitigate through simple IP-based blocking.

Detection Methods for CVE-2021-47865

Indicators of Compromise

  • Unusually high number of simultaneous FTP connections from single or multiple IP addresses
  • Rapid connection establishment and teardown patterns in FTP server logs
  • Server connection pool consistently at or near maximum capacity
  • Legitimate users reporting inability to connect to FTP services
  • Network monitoring showing TCP SYN flood patterns targeting port 21

Detection Strategies

  • Monitor FTP server connection counts and alert when thresholds approach maximum limits
  • Implement network intrusion detection rules for connection flooding patterns on FTP ports
  • Analyze server logs for rapid successive connection attempts from individual IP addresses
  • Deploy network flow analysis to identify anomalous traffic volumes to FTP services
  • Configure SIEM rules to correlate connection failures with potential DoS activity

Monitoring Recommendations

  • Enable detailed connection logging in ProFTPD configuration for forensic analysis
  • Set up real-time alerting for connection pool exhaustion events
  • Monitor server resource utilization including file descriptors and memory
  • Implement network-level traffic analysis for the FTP service segment
  • Regularly review connection logs for patterns indicative of reconnaissance or attack attempts

How to Mitigate CVE-2021-47865

Immediate Actions Required

  • Review and reduce the maximum connection limit (MaxInstances directive) to balance availability and resource protection
  • Implement per-IP connection limits using the MaxClientsPerHost directive
  • Deploy network-level rate limiting for incoming connections on FTP ports
  • Consider placing ProFTPD behind a reverse proxy or load balancer with DoS protection capabilities
  • Enable connection timeout settings to quickly release abandoned connections

Patch Information

Consult the ProFTPD Official Website and the GitHub ProFTPD Repository for the latest security updates and patches. Review the VulnCheck ProFTPD Advisory for detailed remediation guidance. Additional technical details about the vulnerability can be found at Exploit-DB #49697.

Workarounds

  • Implement firewall rules to limit the rate of new connections from individual IP addresses
  • Configure iptables or equivalent to drop excessive connection attempts using hashlimit or connlimit modules
  • Use TCP wrappers or mod_wrap to restrict FTP access to known IP ranges where possible
  • Deploy a network-based DoS mitigation appliance or cloud-based protection service in front of the FTP server
  • Consider migrating to SFTP or other secure file transfer protocols with more robust connection handling
bash
# Example ProFTPD configuration hardening
# Add these directives to /etc/proftpd/proftpd.conf

# Limit maximum simultaneous connections
MaxInstances 30

# Limit connections per client IP address
MaxClientsPerHost 3

# Set aggressive timeouts for idle connections
TimeoutIdle 120
TimeoutNoTransfer 300
TimeoutLogin 60

# Example iptables rate limiting for FTP port
# iptables -A INPUT -p tcp --dport 21 -m connlimit --connlimit-above 3 -j DROP
# iptables -A INPUT -p tcp --dport 21 -m hashlimit --hashlimit-name ftp --hashlimit-mode srcip --hashlimit-above 3/min --hashlimit-burst 5 -j DROP

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechProftpd

  • SeverityHIGH

  • CVSS Score8.7

  • EPSS Probability0.04%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-770
  • Technical References
  • ProFTPD Official Website

  • GitHub ProFTPD Repository

  • Exploit-DB #49697

  • VulnCheck ProFTPD Advisory
  • Related CVEs
  • CVE-2021-46854: ProFTPD Information Disclosure Flaw

  • CVE-2024-57392: ProFTPD Buffer Overflow RCE Vulnerability

  • CVE-2020-9273: ProFTPD Use-After-Free RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English