SolarWinds Patches Critical Serv-U Vulnerabilities Allowing Remote Code Execution
#Vulnerabilities

SolarWinds Patches Critical Serv-U Vulnerabilities Allowing Remote Code Execution

Security Reporter
3 min read

SolarWinds has released urgent security updates for Serv-U 15.5 to fix four critical vulnerabilities rated 9.1 on CVSS scale, all allowing remote code execution with administrative privileges.

SolarWinds has released critical security updates to address four severe vulnerabilities in its Serv-U file transfer software that could allow attackers to execute arbitrary code with root privileges. The flaws, all rated 9.1 on the CVSS scoring system, affect Serv-U version 15.5 and have been patched in version 15.5.4.

Critical Vulnerabilities Detailed

The four vulnerabilities discovered in Serv-U 15.5 include:

  • CVE-2025-40538 - A broken access control vulnerability that enables attackers to create system admin users and execute arbitrary code as root through domain admin or group admin privileges
  • CVE-2025-40539 - A type confusion vulnerability allowing execution of arbitrary native code as root
  • CVE-2025-40540 - Another type confusion vulnerability with the same root-level code execution capability
  • CVE-2025-40541 - An insecure direct object reference (IDOR) vulnerability that permits native code execution as root

SolarWinds emphasized that these vulnerabilities require administrative privileges for successful exploitation. The company also noted that on Windows deployments, the security risk is considered medium since services "frequently run under less-privileged service accounts by default."

Historical Context and Exploitation Concerns

While SolarWinds has not reported any active exploitation of these specific vulnerabilities in the wild, the company's software has been targeted by sophisticated threat actors in the past. Previous Serv-U vulnerabilities, including CVE-2021-35211, CVE-2021-35247, and CVE-2024-28995, were successfully exploited by malicious actors.

Notably, a China-based hacking group tracked as Storm-0322 (formerly DEV-0322) was observed leveraging earlier Serv-U vulnerabilities in real-world attacks. This history underscores the importance of prompt patching, as threat actors have demonstrated both the capability and willingness to exploit Serv-U security flaws.

Immediate Action Required

Organizations using SolarWinds Serv-U should immediately upgrade to version 15.5.4 to protect against these critical vulnerabilities. The high CVSS scores (9.1) indicate these flaws pose significant risk and warrant immediate attention from security teams.

For administrators, the patching process should be prioritized, particularly in environments where Serv-U runs with elevated privileges. While the Windows-specific risk is somewhat mitigated by default service account configurations, any system where administrative access is granted represents a potential attack vector.

Broader Security Implications

The discovery of multiple critical vulnerabilities in a widely-used file transfer solution highlights the ongoing challenges in securing enterprise infrastructure. File transfer systems like Serv-U often handle sensitive data and serve as critical components in business operations, making them attractive targets for attackers.

The concentration of four critical flaws in a single software version also raises questions about SolarWinds' security development lifecycle and code review processes. Organizations should consider this incident when evaluating their vendor risk management strategies and may want to review their overall approach to securing file transfer systems.

Featured image

This vulnerability disclosure comes amid a wave of significant security incidents across the industry. Recent reports have uncovered 25 password recovery attacks in major cloud password managers, while new ransomware variants like Reynolds Ransomware are incorporating advanced techniques to disable endpoint detection and response (EDR) security tools.

The security landscape continues to evolve rapidly, with threat actors increasingly targeting critical infrastructure and enterprise software. Organizations must maintain vigilant patch management practices and stay informed about emerging threats to protect their systems effectively.

For more information on the Serv-U vulnerabilities and patching instructions, visit the official SolarWinds security advisory page.

Comments

Loading comments...