SolarWinds has issued updates to address three critical vulnerabilities in its Serv-U file transfer software. If left unpatched, these flaws could allow an attacker with administrator-level access to execute arbitrary code on the underlying server.
Although exploitation requires valid administrator credentials, an attacker who obtains them through credential theft, brute-force attempts, or other compromises could gain full control of the system. From there, they could deploy malware, access or exfiltrate sensitive data, or use the compromised server as a foothold into the rest of the network.
Organizations with internet-exposed Serv-U instances should treat this as particularly urgent.
Host & File System
Processes & Network
Logs & Authentication
Example Hunt Queries
- Identify child processes spawned by the Serv-U service
- Search for persistence mechanisms like registries or scheduled tasks
- List files created or modified in the Serv-U directory within the last N days
- List outbound connections from the Serv-U host and check reputation
- Large or unusual data transfers originating to and from the Serv-U server
SIEM: Check Logins for strange login attempts or brute-force patterns
Key Takeaway
If you’re running Serv-U, apply the update without delay. Treat these vulnerabilities as a high-priority risk and verify that your environment is properly secured and monitored.
If you are worried about any of the threats outlined in this bulletin or need help in determining what steps you should take to protect yourself from the most material threats facing your organisation, please contact your account manager, or alternatively Get in touch to find out how you can protect your organisation.