SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution
好的,我现在需要帮用户总结这篇文章的内容。用户的要求是用中文,控制在100字以内,而且不需要特定的开头,直接写描述。 首先,我得通读整篇文章,抓住关键点。文章主要讲SolarWinds发布了更新,修复了Serv-U文件传输软件中的四个关键安全漏洞。这些漏洞可能导致远程代码执行。每个漏洞的CVSS评分都是9.1,属于高危。 接下来,漏洞的细节:CVE-2025-40538到40541,分别涉及访问控制、类型混淆和IDOR问题。攻击者需要管理员权限才能利用这些漏洞,在Windows上的风险中等,因为服务通常以低权限运行。 受影响的版本是15.5,已经修复到15.5.4。虽然没有提到这些漏洞被实际利用,但之前的一些CVE已经被恶意组织利用过。 现在我需要把这些信息浓缩到100字以内。重点包括:SolarWinds修复了四个高危漏洞(CVSS 9.1),可能导致远程代码执行;需要管理员权限;影响版本及修复版本;以及之前有类似漏洞被利用的情况。 最后,确保语言简洁明了,不使用复杂的术语,并且直接进入内容。 </think> SolarWinds修复了Serv-U文件传输软件中的四个高危安全漏洞(CVSS评分9.1),可能导致远程代码执行。攻击者需管理员权限利用这些漏洞,在Windows上风险中等。受影响版本为15.5,已通过15.5.4修复。此前类似漏洞曾被恶意组织利用。 2026-2-25 07:4:0 Author: thehackernews.com(查看原文) 阅读量:14 收藏

Vulnerability / Windows Security

SolarWinds has released updates to address four critical security flaws in its Serv-U file transfer software that, if successfully exploited, could result in remote code execution.

The vulnerabilities, all rated 9.1 on the CVSS scoring system, are listed below -

  • CVE-2025-40538 - A broken access control vulnerability that allows an attacker to create a system admin user and execute arbitrary code as root via domain admin or group admin privileges.
  • CVE-2025-40539 - A type confusion vulnerability that allows an attacker to execute arbitrary native code as root.
  • CVE-2025-40540 - A type confusion vulnerability that allows an attacker to execute arbitrary native code as root.
  • CVE-2025-40541 - An insecure direct object reference (IDOR) vulnerability that allows an attacker to execute native code as root.

SolarWinds noted that the vulnerabilities require administrative privileges for successful exploitation. It also said that they carry a medium security risk on Windows deployments as the services "frequently run under less-privileged service accounts by default."

The four shortcomings affect SolarWinds Serv-U version 15.5. They have been addressed in SolarWinds Serv-U version 15.5.4.

While SolarWinds makes no mention of the security flaws being exploited in the wild, prior vulnerabilities in the software (CVE-2021-35211, CVE-2021-35247, and CVE-2024-28995) have been exploited by malicious actors, including by a China-based hacking group tracked as Storm-0322 (formerly DEV-0322).

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/solarwinds-patches-4-critical-serv-u.html
如有侵权请联系:admin#unsafe.sh