SolarWinds Serv-U Vulnerable to Directory Traversal Remote Code Execution
CVE-2024-28073
7.2HIGH
Summary
A remote code vulnerability has been identified in SolarWinds Serv-U, which is susceptible to directory traversal issues. This security flaw enables attackers with high levels of privilege to manipulate file paths, potentially leading to unauthorized command execution. The exploitation requires access to a highly privileged user account, emphasizing the necessity for stringent access controls and regular security audits. Organizations leveraging SolarWinds Serv-U must ensure they are implementing the latest security patches to mitigate associated risks. For more information, please refer to the official advisory.
Affected Version(s)
ServU 15.4.1 and previous versions
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Alexander Skovsende at the Institut For Cyber Risk