{"id":25,"date":"2026-02-25T23:44:18","date_gmt":"2026-02-25T23:44:18","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=25"},"modified":"2026-02-25T23:44:18","modified_gmt":"2026-02-25T23:44:18","slug":"solarwinds-patches-4-critical-serv-u-15-5-flaws-allowing-root-code-execution","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=25","title":{"rendered":"SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Feb 25, 2026<\/span><\/span><span class=\"p-tags\">Vulnerability \/ Windows Security<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiJsxWsiu7fwprSIRxMv2GeyDwgjXKWppIf60pJICGIbw87BvlIEuh4P_8cWt1GXCcChC7u521YqP5RVa-3vV-Hs2djakl0xfjcRe5YAQPnrekGJBVrrdC8MKMcGKsG0YxOXZF15XUTTLXiEWhJViXZUnI2Rl2S9QLe3lUuautotpE8OhS1D6g2HfmAEI86\/s1700-e365\/solarwinds-serv-u.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>SolarWinds has <a href=\"https:\/\/documentation.solarwinds.com\/en\/success_center\/servu\/content\/release_notes\/servu_15-5-4_release_notes.htm\" rel=\"noopener\" target=\"_blank\">released updates<\/a> to address four critical security flaws in its Serv-U file transfer software that, if successfully exploited, could result in remote code execution.<\/p>\n<p>The vulnerabilities, all rated 9.1 on the CVSS scoring system, are listed below &#8211;<\/p>\n<ul>\n<li><strong><a href=\"https:\/\/www.solarwinds.com\/trust-center\/security-advisories\/cve-2025-40538\" rel=\"noopener\" target=\"_blank\">CVE-2025-40538<\/a><\/strong> &#8211; A broken access control vulnerability that allows an attacker to create a system admin user and execute arbitrary code as root via domain admin or group admin privileges.<\/li>\n<li><strong><a href=\"https:\/\/www.solarwinds.com\/trust-center\/security-advisories\/cve-2025-40539\" rel=\"noopener\" target=\"_blank\">CVE-2025-40539<\/a><\/strong> &#8211; A type confusion vulnerability that allows an attacker to execute arbitrary native code as root.<\/li>\n<li><strong><a href=\"https:\/\/www.solarwinds.com\/trust-center\/security-advisories\/cve-2025-40540\" rel=\"noopener\" target=\"_blank\">CVE-2025-40540<\/a><\/strong> &#8211; A type confusion vulnerability that allows an attacker to execute arbitrary native code as root.<\/li>\n<li><strong><a href=\"https:\/\/www.solarwinds.com\/trust-center\/security-advisories\/cve-2025-40541\" rel=\"noopener\" target=\"_blank\">CVE-2025-40541<\/a><\/strong> &#8211; An insecure direct object reference (IDOR) vulnerability that allows an attacker to execute native code as root.<\/li>\n<\/ul>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/ztw-hands-on-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhC66R4wPZ8qksTJukqlCCmrHCUX65DnpWW1nKnkOhy0Poe219tacbU6h09qEfUgRHxoObBazf3SVJ4OAd_iVd0EFecj-vskZSfroQ7rh0XyxQd6Ep_zNgqDW95YU4zG1Gpin8rHPK8Rqu_1KV7tf-G-7JJhxOVHhRJDWnj0qfq82uZSAvAG2rxK-Fe5fwd\/s728-e100\/ThreatLocker-d.png\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>SolarWinds noted that the vulnerabilities require administrative privileges for successful exploitation. It also said that they carry a medium security risk on Windows deployments as the services \u00abfrequently run under less-privileged service accounts by default.\u00bb<\/p>\n<p>The four shortcomings affect SolarWinds Serv-U version 15.5. They have been addressed in SolarWinds Serv-U version 15.5.4.<\/p>\n<p>While SolarWinds makes no mention of the security flaws being exploited in the wild, prior vulnerabilities in the software (CVE-2021-35211, CVE-2021-35247, and CVE-2024-28995) have been exploited by malicious actors, including by a China-based hacking group tracked as Storm-0322 (formerly DEV-0322).<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Feb 25, 2026Vulnerability \/ Windows Security SolarWinds has released updates to address four critical security flaws in its Serv-U file transfer software that, if successfully exploited, could result in&hellip;<\/p>\n","protected":false},"author":1,"featured_media":26,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[60,10,58,13,11,57,61,59,56],"class_list":["post-25","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-allowing","tag-code","tag-critical","tag-execution","tag-flaws","tag-patches","tag-root","tag-servu","tag-solarwinds"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/25","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=25"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/25\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/26"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=25"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=25"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=25"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}