Latest
Vulnerabilities

New Serv-U vulnerabilities continue SolarWinds' trend of critical disclosures

New Serv-U vulnerabilities continue SolarWinds' trend of critical disclosures

SolarWinds is facing significant security challenges, particularly with its Serv-U managed file transfer server.

The software firm has issued four patches addressing critical remote code execution (RCE) vulnerabilities that could enable attackers to gain root access to unpatched servers. These vulnerabilities are classified as "critical," indicating the highest level of severity.

“These should be treated as high-urgency patch events,” explained Ensar Seker, the Chief Information Security Officer at SOCRadar. “When you are talking about pre-authentication RCE with potential root-level access, you are effectively talking about full system compromise.”

Flaws let attackers execute arbitrary code

Serv-U is SolarWinds' self-hosted file transfer tool designed for both Windows and Linux platforms. It supports managed file transfer (MFT) and file transfer protocol (FTP) capabilities, allowing enterprises to exchange files securely via FTPS, SFTP, and HTTP/S.

The vulnerabilities that have been patched include:

  • CVE-2025-40538: This critical access control vulnerability allows attackers to create a system admin user and execute arbitrary code, granting them root domain and group admin privileges.
  • CVE-2025-40539 and CVE-2025-40540: These vulnerabilities involve "type confusion," tricking programs into unintended behaviors, allowing attackers to access systems and execute malicious code as root or with privileged accounts.
  • CVE-2025-40541: Another broken access control vulnerability that lets threat actors execute native code as either root or a privileged account.

It's crucial to note that exploiting these vulnerabilities requires attackers to have already obtained admin or privileged access on the targeted servers.

However, if threat actors manage to exploit unpatched Serv-U instances, they could execute arbitrary commands, deploy malware, create new privileged accounts, disable security measures, and move laterally within the broader environment, Seker stated.

Serv-U is particularly vulnerable as it is designed to be an externally facing file transfer solution. “Many organizations expose it to the internet for partners, vendors, and customers,” Seker noted, which significantly increases the attack surface.

Attackers could potentially exfiltrate sensitive files, manipulate transferred data, implant backdoors, and use the server as a staging point for ransomware attacks. The risk escalates in environments where Serv-U is integrated with Active Directory or internal storage systems, Seker highlighted.

“At that point, it is no longer a file transfer issue,” he emphasized. “It becomes a domain-wide incident response scenario.”

Not a ‘patch when convenient’ situation

Security leaders must act with urgency and discipline, according to Seker. Immediate actions include patching to the latest version, reviewing whether Serv-U is exposed to the internet, validating access controls, checking logs for signs of exploitation, and rotating associated credentials. If there is any suspicion of exploitation, enterprises should assume full compromise of the host and conduct a thorough forensic review.

“This is not a ‘patch when convenient’ update; it is a ‘patch and verify’ situation,” Seker insisted.

In addition to patching, organizations using Serv-U should review logs to determine if they have already experienced data loss, advised David Shipley from Beauceron Security. He remarked that RCE poses severe risks for file transfer tools, pointing to the MoveIT breach as a significant example.

“Root access equals game over,” Shipley warned. “These tools are often used to transfer highly sensitive personal identifiable information, financial information, and medical data.”

SolarWinds a favored hacker target

SolarWinds remains a prime target for attackers. In late January, the company addressed six critical vulnerabilities related to authentication bypass and RCE in its Web Help Desk (WHD) IT software, four of which were rated critical.

Previously, the company resolved a patch bypass issue for a WHD RCE flaw that had been flagged a year earlier by the US Cybersecurity and Infrastructure Security Agency (CISA).

This pattern of cybersecurity incidents is partly attributed to visibility. SolarWinds products are widely deployed across both enterprise and government sectors, making them attractive targets for both criminal and nation-state actors.

“The more critical the software’s role in infrastructure, the more aggressively it will be researched and attacked,” Seker pointed out. He also highlighted that these repeated critical flaws underscore the necessity for vendors operating in privileged network positions to maintain highly mature secure development lifecycles and conduct rigorous third-party security testing.

“Trust in infrastructure software is earned continuously, not once,” Seker added.

The overarching takeaway is that organizations should not rely solely on vendor reputation. Every externally exposed service, especially those capable of handling authentication and file transfers, should be treated as potentially exploitable. This necessitates continuous monitoring of the external attack surface, virtual patching via web application firewalls where applicable, strict network segmentation, and zero-trust access controls.

“The question is not whether critical vulnerabilities will appear again they will but whether the organization can detect, patch, and contain them before adversaries do,” Seker concluded.

More in Vulnerabilities & Patches

30-Year-Old Vulnerability Discovered in libpng Library
Vulnerabilities

30-Year-Old Vulnerability Discovered in libpng Library

Apr 16, 2026 3 min read
Microsoft Addresses Exploited SharePoint Vulnerability and Fixes 160 Additional Security Flaws
Vulnerabilities

Microsoft Addresses Exploited SharePoint Vulnerability and Fixes 160 Additional Security Flaws

Apr 16, 2026 2 min read
10 Persistent Software Bugs That Took Ages to Fix
Vulnerabilities

10 Persistent Software Bugs That Took Ages to Fix

Apr 15, 2026 9 min read
Vulnerability may allow hackers to seize control of Juniper Networks PTX core routers
Vulnerabilities

Vulnerability may allow hackers to seize control of Juniper Networks PTX core routers

Apr 14, 2026 3 min read