The company confirms this is a new vulnerability that is not related to the supply chain attack discovered in December 2020.
SolarWinds has issued an advisory confirming a new zero-day affecting its Serv-U Managed File Transfer and Serv-U Secured FTP products. It has developed a hotfix to address the flaw.
The remote code execution vulnerability exists in the latest Serv-U version 15.2.3 HF1 released on May 5, 2021, and all prior versions, the company reported in a weekend advisory. An attacker who successfully exploited the flaw could run arbitrary code with privileges; install programs; view, change, or delete data; or run programs on the affected systems.
SolarWinds learned of the vulnerability from Microsoft, which found attackers already using it.
"Microsoft has provided evidence of limited, targeted customer impact, though SolarWinds does not currently have an estimate of how many customers may be directly affected by the vulnerability," SolarWinds wrote in its advisory. It is unaware of the identity of the potentially affected customers, officials noted.
This vulnerability only affects Serv-U Managed File Transfer and Serv-U Secure FTP, officials noted, and it does not affect any other SolarWinds or N-able products. The company urges Serv-U users to install the hotfix and said it will publish additional details on the flaw after giving customers time to upgrade.
Read more in SolarWinds' full advisory.
About the Author(s)
You May Also Like
Guarding the Cloud: Top 5 Cloud Security Hacks and How You Can Avoid Them
April 4, 2024Cybersecurity Strategies for Small and Med Sized Businesses
April 11, 2024Defending Against Today's Threat Landscape with MDR
April 18, 2024Securing Code in the Age of AI
April 24, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024Black Hat Asia - April 16-19 - Learn More
April 16, 2024