Microsoft on Wednesday disclosed facts of a new security vulnerability in SolarWinds Serv-U software package that it said was being weaponized by risk actors to propagate attacks leveraging the Log4j flaws to compromise targets.
Tracked as CVE-2021-35247 (CVSS score: 5.3), the issue is an ” input validation vulnerability that could permit attackers to build a query provided some input and ship that question over the network with out sanitation,” Microsoft Threat Intelligence Centre (MSTIC) said.
The flaw, which was found out by security researcher Jonathan Bar Or, has an effect on Serv-U versions 15.2.5 and prior, and has been dealt with in Serv-U model 15.3.
“The Serv-U web login display to LDAP authentication was making it possible for people that were being not adequately sanitized,” SolarWinds explained in an advisory, introducing it “up-to-date the enter mechanism to perform supplemental validation and sanitization.”
The IT administration software program maker also pointed out that “no downstream result has been detected as the LDAP servers ignored improper characters.” It really is not straight away crystal clear if the attacks detected by Microsoft ended up mere attempts to exploit the flaw or if they were being in the long run profitable.
The progress will come as multiple danger actors proceed to choose edge of the Log4Shell flaws to mass scan and infiltrate susceptible networks for deploying backdoors, coin miners, ransomware, and distant shells that grant persistent accessibility for even more post-exploitation activity.
Akamai researchers, in an examination posted this week, also located evidence of the flaws being abused to infect and support in the proliferation of malware applied by the Mirai botnet.
On leading of this, a China-based mostly hacking team has been previously noticed exploiting a critical security vulnerability affecting SolarWinds Serv-U (CVE-2021-35211) to put in malicious packages on the infected devices.
Located this write-up interesting? Adhere to THN on Fb, Twitter and LinkedIn to read through far more exclusive written content we write-up.
Some sections of this short article are sourced from: