• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

SolarWinds Serv-U Vulnerability Under Active Attack – Patch Immediately

You are here: Home / Cyber Security News / SolarWinds Serv-U Vulnerability Under Active Attack – Patch Immediately

A not long ago patched high-severity flaw impacting SolarWinds Serv-U file transfer program is being actively exploited by destructive actors in the wild.

The vulnerability, tracked as CVE-2024-28995 (CVSS score: 8.6), worries a listing transversal bug that could enable attackers to read through delicate files on the host device.

Influencing all versions of the computer software prior to and like Serv-U 15.4.2 HF 1, it was tackled by the business in variation Serv-U 15.4.2 HF 2 (15.4.2.157) launched before this thirty day period.

The listing of items inclined to CVE-2024-28995 is underneath –

  • Serv-U FTP Server 15.4
  • Serv-U Gateway 15.4
  • Serv-U MFT Server 15.4, and
  • Serv-U File Server 15.4

Security researcher Hussein Daher of Web Immunify has been credited with exploring and reporting the flaw. Following the general public disclosure, further technical details and a evidence-of-thought (PoC) exploit have considering the fact that been designed obtainable.

Cybersecurity agency Quick7 described the vulnerability as trivial to exploit and that it makes it possible for external unauthenticated attackers to read through any arbitrary file on disk, including binary data files, assuming they know the path to that file and it’s not locked.

“Higher-severity information disclosure issues like CVE-2024-28995 can be employed in smash-and-seize assaults exactly where adversaries obtain accessibility to and try to speedily exfiltrate facts from file transfer alternatives with the aim of extorting victims,” it stated.

“File transfer goods have been specific by a wide array of adversaries the past many decades, which include ransomware groups.”

Indeed, in accordance to risk intelligence firm GreyNoise, danger actors have presently started to carry out opportunistic assaults weaponizing the flaw in opposition to its honeypot servers to obtain delicate data files like /and so forth/passwd, with attempts also recorded from China.

With past flaws in Serv-U software exploited by threat actors, it is really essential that consumers use the updates as shortly as probable to mitigate possible threats.

“The reality that attackers are making use of publicly readily available PoCs suggests the barrier to entry for malicious actors is exceptionally lower,” Naomi Buckwalter, director of products security at Distinction Security, claimed in a statement shared with The Hacker News.

“Effective exploitation of this vulnerability could be a stepping stone for attackers. By attaining obtain to sensitive info like qualifications and process data files, attackers can use that data to start even further assaults, a technique referred to as ‘chaining.’ This can guide to a more widespread compromise, potentially impacting other units and programs.”

Discovered this posting appealing? Comply with us on Twitter  and LinkedIn to read much more exclusive articles we submit.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « U.S. Bans Kaspersky Software, Citing National Security Risks
Next Post: Oyster Backdoor Spreading via Trojanized Popular Software Downloads »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Google Chrome Zero-Day CVE-2025-2783 Exploited by TaxOff to Deploy Trinper Backdoor
  • LangSmith Bug Could Expose OpenAI Keys and User Data via Malicious Agents
  • Silver Fox APT Targets Taiwan with Complex Gh0stCringe and HoldingHands RAT Malware
  • Google Warns of Scattered Spider Attacks Targeting IT Support Teams at U.S. Insurance Firms
  • Are Forgotten AD Service Accounts Leaving You at Risk?

Copyright © 2025 · AllTech.News, All Rights Reserved.