{"id":43927,"date":"2026-02-25T17:51:15","date_gmt":"2026-02-25T09:51:15","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/25\/solarwinds-patches-4-critical-serv-u-15-5-flaws-allowing-root-code-execution\/"},"modified":"2026-02-25T17:51:15","modified_gmt":"2026-02-25T09:51:15","slug":"solarwinds-patches-4-critical-serv-u-15-5-flaws-allowing-root-code-execution","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/25\/solarwinds-patches-4-critical-serv-u-15-5-flaws-allowing-root-code-execution\/","title":{"rendered":"SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution"},"content":{"rendered":"<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiJsxWsiu7fwprSIRxMv2GeyDwgjXKWppIf60pJICGIbw87BvlIEuh4P_8cWt1GXCcChC7u521YqP5RVa-3vV-Hs2djakl0xfjcRe5YAQPnrekGJBVrrdC8MKMcGKsG0YxOXZF15XUTTLXiEWhJViXZUnI2Rl2S9QLe3lUuautotpE8OhS1D6g2HfmAEI86\/s1600\/solarwinds-serv-u.jpg\" style=\"display: block; padding: 1em 0; text-align: center; clear: left; float: left;\"><img decoding=\"async\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiJsxWsiu7fwprSIRxMv2GeyDwgjXKWppIf60pJICGIbw87BvlIEuh4P_8cWt1GXCcChC7u521YqP5RVa-3vV-Hs2djakl0xfjcRe5YAQPnrekGJBVrrdC8MKMcGKsG0YxOXZF15XUTTLXiEWhJViXZUnI2Rl2S9QLe3lUuautotpE8OhS1D6g2HfmAEI86\/s1600\/solarwinds-serv-u.jpg\" alt=\"SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution\"\/><\/a><\/div>\n<p>SolarWinds has <a href=\"https:\/\/documentation.solarwinds.com\/en\/success_center\/servu\/content\/release_notes\/servu_15-5-4_release_notes.htm\" rel=\"noopener\" target=\"_blank\">released updates<\/a> to address four critical security flaws in its Serv-U file transfer software that, if successfully exploited, could result in remote code execution.<\/p>\n<p>The vulnerabilities, all rated 9.1 on the CVSS scoring system, are listed below &#8211;<\/p>\n<ul>\n<li><strong><a href=\"https:\/\/www.solarwinds.com\/trust-center\/security-advisories\/cve-2025-40538\" rel=\"noopener\" target=\"_blank\">CVE-2025-40538<\/a><\/strong> &#8211; A broken access control vulnerability that allows an attacker to create a system admin user and execute arbitrary code as root via domain admin or group admin privileges.<\/li>\n<li><strong><a href=\"https:\/\/www.solarwinds.com\/trust-center\/security-advisories\/cve-2025-40539\" rel=\"noopener\" target=\"_blank\">CVE-2025-40539<\/a><\/strong> &#8211; A type confusion vulnerability that allows an attacker to execute arbitrary native code as root.<\/li>\n<li><strong><a href=\"https:\/\/www.solarwinds.com\/trust-center\/security-advisories\/cve-2025-40540\" rel=\"noopener\" target=\"_blank\">CVE-2025-40540<\/a><\/strong> &#8211; A type confusion vulnerability that allows an attacker to execute arbitrary native code as root.<\/li>\n<li><strong><a href=\"https:\/\/www.solarwinds.com\/trust-center\/security-advisories\/cve-2025-40541\" rel=\"noopener\" target=\"_blank\">CVE-2025-40541<\/a><\/strong> &#8211; An insecure direct object reference (IDOR) vulnerability that allows an attacker to execute native code as root.<\/li>\n<\/ul>\n<p>SolarWinds noted that the vulnerabilities require administrative privileges for successful exploitation. It also said that they carry a medium security risk on Windows deployments as the services &#8220;frequently run under less-privileged service accounts by default.&#8221;<\/p>\n<p>The four shortcomings affect SolarWinds Serv-U version 15.5. They have been addressed in SolarWinds Serv-U version 15.5.4.<\/p>\n<p>While SolarWinds makes no mention of the security flaws being exploited in the wild, prior vulnerabilities in the software (<a href=\"https:\/\/thehackernews.com\/2021\/09\/microsoft-says-chinese-hackers-were.html\" rel=\"noopener\" target=\"_blank\">CVE-2021-35211<\/a>, <a href=\"https:\/\/thehackernews.com\/2022\/01\/microsoft-hackers-exploiting-new.html\" rel=\"noopener\" target=\"_blank\">CVE-2021-35247<\/a>, and <a href=\"https:\/\/thehackernews.com\/2024\/06\/solarwinds-serv-u-vulnerability-under.html\" rel=\"noopener\" target=\"_blank\">CVE-2024-28995<\/a>) have been exploited by malicious actors, including by a China-based hacking group tracked as Storm-0322 (formerly DEV-0322).<\/p>\n<div><\/div>\n<div>Found this article interesting?  Follow us on <a href='https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ' rel='noopener' target='_blank'>Google News<\/a>, <a href='https:\/\/twitter.com\/thehackersnews' rel='noopener' target='_blank'>Twitter<\/a> and <a href='https:\/\/www.linkedin.com\/company\/thehackernews\/' rel='noopener' target='_blank'>LinkedIn<\/a> to read more exclusive content we post.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>SolarWinds has released updates to address four critical security flaws in its Serv-U file transfer software that, if successfully exploited, could result in remote code execution.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-43927","post","type-post","status-publish","format-standard","hentry","category-thehackernews"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43927","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43927"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43927\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43927"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43927"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43927"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}