{"id":43892,"date":"2026-02-24T21:58:11","date_gmt":"2026-02-24T13:58:11","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/24\/critical-solarwinds-serv-u-flaws-offer-root-access-to-servers\/"},"modified":"2026-02-24T21:58:11","modified_gmt":"2026-02-24T13:58:11","slug":"critical-solarwinds-serv-u-flaws-offer-root-access-to-servers","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/24\/critical-solarwinds-serv-u-flaws-offer-root-access-to-servers\/","title":{"rendered":"Critical SolarWinds Serv-U flaws offer root access to servers"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2026\/01\/28\/SolarWinds.jpg\" width=\"1600\" alt=\"Critical SolarWinds Serv-U flaws offer root access to servers\"><\/p>\n<p>SolarWinds has released security updates to patch four critical Serv-U remote code execution vulnerabilities that could grant attackers root access to unpatched servers.<\/p>\n<p>Serv-U is the company&#8217;s self-hosted Windows and Linux file transfer software that comes with both Managed File Transfer (MFT) and FTP server capabilities, enabling organizations to securely exchange files via FTP, FTPS, SFTP, and HTTP\/S.<\/p>\n<p>The most severe of the four security flaws patched by SolarWinds today in Serv-U 15.5.4 is tracked as CVE-2025-40538, and it allows attackers with high privileges to gain root or admin permissions on vulnerable servers.<\/p>\n<p>&#8220;A broken access control vulnerability exists in Serv-U which, when exploited, gives an attacker the ability to create a system admin user and execute arbitrary code as root via domain admin or group admin privileges,&#8221; <a href=\"https:\/\/documentation.solarwinds.com\/en\/success_center\/servu\/content\/release_notes\/servu_15-5-4_release_notes.htm#link7\" target=\"_blank\" rel=\"nofollow noopener\">SolarWinds said<\/a> in a Tuesday advisory.<\/p>\n<p>The company also patched two type confusion flaws and an Insecure Direct Object Reference (IDOR) vulnerability that can be exploited to gain code execution with root privileges.<\/p>\n<p>Luckily, all four security flaws require attackers to already have high privileges on the targeted servers, which will limit potential exploitation attempts to scenarios where attackers can chain privilege escalation vulnerabilities or use previously stolen admin credentials.<\/p>\n<p>Shodan currently tracks <a href=\"https:\/\/www.shodan.io\/search?query=html%3A%22Serv-U%22\" target=\"_blank\" rel=\"nofollow noopener\">over 12,000 Internet-exposed Serv-U servers<\/a>, while Shadowserver estimates the number to be <a href=\"https:\/\/dashboard.shadowserver.org\/statistics\/iot-devices\/time-series\/?date_range=7&amp;vendor=ivanti&amp;model=epmm&amp;dataset=count&amp;limit=100&amp;group_by=geo&amp;stacking=stacked\" target=\"_blank\" rel=\"nofollow noopener\">less than 1,200<\/a>.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"370\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1109292\/2026\/Serv-U%20servers%20exposed%20online.jpg\" width=\"700\" alt=\"Critical SolarWinds Serv-U flaws offer root access to servers\"><figcaption><em>Serv-U servers exposed online (Shadowserver)<\/em><\/figcaption><\/figure>\n<\/div>\n<p>&#8203;File transfer software like SolarWinds Serv-U is often targeted in attacks because it provides easy access to documents that may contain sensitive corporate and customer data.<\/p>\n<p>Over the last five years, multiple cybercrime and state-sponsored hacking groups have targeted Serv-U vulnerabilities in data theft attacks, with the Clop gang having exploited a Serv-U Secure FTP remote code execution vulnerability (CVE-2021-35211) to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/clop-gang-exploiting-solarwinds-serv-u-flaw-in-ransomware-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">breach corporate networks in ransomware attacks<\/a>.<\/p>\n<p>China-based hackers (tracked by Microsoft as DEV-0322), known for primarily targeting U.S. defense and software companies, also <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/chinese-hackers-use-new-solarwinds-zero-day-in-targeted-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">deployed CVE-2021-35211 exploits in zero-day attacks<\/a> starting in July 2021.<\/p>\n<p>More recently, in June 2024, cybersecurity companies Rapid7 and GreyNoise flagged a SolarWinds Serv-U path-traversal vulnerability (CVE-2024-28995) <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/solarwinds-serv-u-path-traversal-flaw-actively-exploited-in-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">as actively exploited<\/a> by threat actors who used publicly available proof-of-concept (PoC) exploits.<\/p>\n<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is currently <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog?search_api_fulltext=solarwinds\" target=\"_blank\" rel=\"nofollow noopener\">tracking nine SolarWinds security flaws<\/a>that have either been or are still actively being exploited in the wild.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&amp;utm_medium=paid_media&amp;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/t\/tines-in-art-square.jpg\" alt=\"Critical SolarWinds Serv-U flaws offer root access to servers\"><\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&amp;utm_medium=paid_media&amp;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">The future of IT infrastructure is here<\/a><\/h2>\n<p>Modern IT infrastructure moves faster than manual workflows can handle.<\/p>\n<p>In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.<\/p>\n<p>          <button><a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&amp;utm_medium=paid_media&amp;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">Get the guide<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/solarwinds-serv-u-path-traversal-flaw-actively-exploited-in-attacks\/\">SolarWinds Serv-U path traversal flaw actively exploited in attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/threat-actors-exploit-solarwinds-wdh-flaws-to-deploy-velociraptor\/\">Hackers exploit SolarWinds WHD flaws to deploy DFIR tool in attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/solarwinds-web-help-desk-flaw-is-now-exploited-in-attacks\/\">SolarWinds Web Help Desk flaw is now exploited in attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/solarwinds-releases-third-patch-to-fix-web-help-desk-rce-bug\/\">SolarWinds releases third patch to fix Web Help Desk RCE bug<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/android-mental-health-apps-with-147m-installs-filled-with-security-flaws\/\">Android mental health apps with 14.7M installs filled with security flaws<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>SolarWinds has released security updates to patch four  [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-43892","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43892","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43892"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43892\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43892"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43892"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}