• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
solarwinds serv u vulnerability under active attack patch immediately

SolarWinds Serv-U Vulnerability Under Active Attack – Patch Immediately

You are here: Home / General Cyber Security News / SolarWinds Serv-U Vulnerability Under Active Attack – Patch Immediately
June 21, 2024

A not long ago patched large-severity flaw impacting SolarWinds Serv-U file transfer program is being actively exploited by destructive actors in the wild.

The vulnerability, tracked as CVE-2024-28995 (CVSS score: 8.6), issues a directory transversal bug that could allow for attackers to read sensitive data files on the host equipment.

Affecting all versions of the application prior to and such as Serv-U 15.4.2 HF 1, it was tackled by the enterprise in version Serv-U 15.4.2 HF 2 (15.4.2.157) introduced before this thirty day period.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

The checklist of merchandise vulnerable to CVE-2024-28995 is under –

  • Serv-U FTP Server 15.4
  • Serv-U Gateway 15.4
  • Serv-U MFT Server 15.4, and
  • Serv-U File Server 15.4

Security researcher Hussein Daher of Web Immunify has been credited with exploring and reporting the flaw. Next the community disclosure, extra complex facts and a evidence-of-strategy (PoC) exploit have given that been manufactured obtainable.

Cybersecurity agency Swift7 described the vulnerability as trivial to exploit and that it lets exterior unauthenticated attackers to examine any arbitrary file on disk, such as binary information, assuming they know the route to that file and it’s not locked.

“Significant-severity info disclosure issues like CVE-2024-28995 can be utilised in smash-and-get attacks in which adversaries obtain entry to and attempt to promptly exfiltrate facts from file transfer options with the intention of extorting victims,” it claimed.

“File transfer products have been qualified by a large array of adversaries the previous various decades, together with ransomware groups.”

Cybersecurity

In truth, according to danger intelligence business GreyNoise, risk actors have currently started to conduct opportunistic attacks weaponizing the flaw from its honeypot servers to access sensitive documents like /etcetera/passwd, with makes an attempt also recorded from China.

With previous flaws in Serv-U program exploited by risk actors, it really is crucial that consumers apply the updates as before long as achievable to mitigate possible threats.

“The actuality that attackers are working with publicly available PoCs usually means the barrier to entry for destructive actors is amazingly reduced,” Naomi Buckwalter, director of item security at Contrast Security, mentioned in a assertion shared with The Hacker Information.

“Effective exploitation of this vulnerability could be a stepping stone for attackers. By gaining accessibility to delicate information and facts like credentials and process documents, attackers can use that information to launch even further attacks, a method referred to as ‘chaining.’ This can lead to a more common compromise, most likely impacting other units and programs.”

Discovered this report exciting? Stick to us on Twitter  and LinkedIn to read a lot more exclusive written content we submit.


Some sections of this short article are sourced from:
thehackernews.com

Previous Post: «u.s. bans kaspersky software, citing national security risks U.S. Bans Kaspersky Software, Citing National Security Risks
Next Post: Oyster Backdoor Spreading via Trojanized Popular Software Downloads oyster backdoor spreading via trojanized popular software downloads»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.