SolarWinds has released urgent patches for four critical vulnerabilities affecting ServU 15.5. All flaws are rated CVSS 9.1 and can allow an attacker with sufficient privileges to execute arbitrary code as root, potentially taking full control of affected systems. The issues are resolved in ServU version 15.5.4.
Although these vulnerabilities require administrative or high privileges to exploit, ServU remains a historically attractive target for threat actors, including ransomware operators and state aligned intrusion groups. The widespread use of ServU for secure file transfer, combined with the high number of internetexposed servers, greatly increases the potential impact.
Affected Product
SolarWinds ServU File Transfer Software
ServU supports FTP, FTPS, SFTP, and HTTP/S, and is widely integrated in secure file exchange workflows.
SolarWinds ServU Critical Vulnerabilities (February 2026)
|
CVE |
Type of Vulnerability |
Impact / What Attackers Can Do |
Privilege Required |
|
CVE202540538 |
Broken Access Control |
Allows attacker to create system admin accounts and execute arbitrary code as root |
High privileges (domain admin / group admin) |
|
CVE202540539 |
Type Confusion |
Enables execution of arbitrary native code as root |
High privileges |
|
CVE202540540 |
Type Confusion |
Enables execution of arbitrary native code as root |
High privileges |
|
CVE202540541 |
Insecure Direct Object Reference (IDOR) |
Allows triggering operations that lead to root level native code execution |
High privileges |
1. Patch Immediately
2. Review Administrative Privileges
Because exploitation requires high-level access:
3. Reduce External Exposure
4. Increase Monitoring
Even though no current exploitation is observed, organisations should:
5. Validate Logging and Alerting
If you are worried about any of the threats outlined in this bulletin or need help in determining what steps you should take to protect yourself from the most material threats facing your organisation, please contact your account manager, or alternatively Get in touch to find out how you can protect your organisation.