SolarWinds has fixed a Serv-U bug that menace actors had been exploiting to unleash Log4j attacks on networks’ inside products.
Risk actors have weaponized a freshly found out bug in SolarWinds Serv-U file-sharing software program to start Log4j attacks against networks’ internal products, Microsoft warned on Wednesday.
SolarWinds issued a fix the working day before, on Tuesday.

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
The vulnerability, tracked as CVE-2021-35247, is an input validation flaw that could let attackers to construct a query, presented some input, and to mail that query over the network without sanitation, Microsoft’s Menace Intelligence Middle (MSTIC) reported.
The bug, identified by Microsoft’s Jonathan Bar Or, affects Serv-U variations 15.2.5 and prior. SolarWinds fastened the vulnerability in Serv-U version 15.3, introduced on Tuesday.
“The Serv-U web login display to LDAP authentication was letting people that were being not sufficiently sanitized,” SolarWinds mentioned in its advisory, incorporating that it experienced up-to-date the enter system “to perform supplemental validation and sanitization.”
SolarWinds explained that it has not observed any “downstream [effect],” specified that “the LDAP servers overlooked improper characters.”
For its aspect, MSTIC didn’t give information about the attacks it is tracked that have been propagated by means of the Serv-U bug.
Just the Latest in Ongoing Log4j Barrage
The Serv-U attacks are just the most current in the rampant Log4j exploit tries and testing that have been thrown at the many flaws in Apache’s Log4j logging library considering the fact that those people flaws were disclosed – and arrived below in close proximity to-fast attack – final month.
On Tuesday, Akamai researchers also described that they’ve detected evidence of the unauthenticated distant code execution (RCE) vulnerability in Log4j – tracked as CVE-2021-44228 – staying adapted to infect and aid in the proliferation of malware made use of by the Mirai botnet by concentrating on Zyxel networking units.
MSTIC strongly suggested that afflicted consumers implement the SolarWinds security updates.
Some parts of this article are sourced from:
threatpost.com