cognitive cybersecurity intelligence

News and Analysis

Search

Critical SolarWinds Serv-U Vulnerabilities Let Attackers Execute Malicious Code Remotely as Admin

Critical SolarWinds Serv-U Vulnerabilities Let Attackers Execute Malicious Code Remotely as Admin

SolarWinds has released security patches addressing three critical remote code execution vulnerabilities in Serv-U that could allow attackers with administrative privileges to execute arbitrary code on affected systems.

The vulnerabilities disclosed in Serv-U version 15.5.3 pose significant risks to organizations that rely on the file transfer software for secure data exchange.

Multiple Pathways to Remote Code Execution

SolarWinds’ three critical vulnerabilities stem from logic errors, broken access controls, and path restriction bypasses within Serv-U’s core functionality.

Attackers exploiting these flaws require administrative access but can leverage them to gain unauthorized code-execution capabilities on the server.

CVE IDVulnerability TitleDescriptionCVSS ScoreSeverityCVE-2025-40547Logic Abuse – RCELogic error allowing malicious actors with admin privileges to execute code9.1CriticalCVE-2025-40548Broken Access Control – RCEMissing validation process enabling code execution for privileged users9.1CriticalCVE-2025-40549Path Restriction BypassPath bypass vulnerability allowing arbitrary code execution on directories9.1Critical

On Windows deployments, CVSS scores are rated as medium severity because services typically run under less-privileged accounts by default. In contrast, Linux systems remain at critical severity levels.

The vulnerabilities highlight a standard attack pattern: abuse of elevated privileges combined with insufficient validation mechanisms.

Organizations running older Serv-U versions face heightened risk, particularly as Serv-U 15.4.1 reached end-of-life on December 16, 2024, with 15.4.2 and 15.5 following suit in mid-2025 and 2026, respectively.

SolarWinds recommends immediate patching to Serv-U 15.5.3 or later. The updated release includes multiple security enhancements beyond CVE fixes, including support for ED25519 public key authentication.

Enhanced IP blocking functionality for file share guests, and account lockout mechanisms to prevent brute-force attacks.

Additional security improvements in version 15.5.3 include X-Forwarded-For protection against IP spoofing and mandatory minimum password length requirements.

HTTP Strict Transport Security (HSTS) enablement, file upload size limits, and upgraded Angular framework to version 19. These layered defenses provide defense-in-depth protection against exploitation attempts.

SolarWinds, unable to immediately upgrade, should prioritize restricting administrative access. Implementing network segmentation and deploying intrusion detection signatures for Serv-U traffic patterns.

Continuous monitoring of authentication logs for suspicious administrative activities remains critical during the transition period.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post Critical SolarWinds Serv-U Vulnerabilities Let Attackers Execute Malicious Code Remotely as Admin appeared first on Cyber Security News.

Source: cybersecuritynews.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts

What to know about GOP's ObamaCare talks

What to know about GOP's ObamaCare talks

Republicans are rushing to deliver an alternative to the Affordable Care Act’s (ACA) enhanced subsidies ahead of a self-imposed mid-December deadline.   President Trump wants