SolarWinds Serv-U: A Critical Security Flaw Exposure Alert
Recently, SolarWinds has issued a critical security advisory warning its customers of multiple high-severity vulnerabilities in their popular file transfer solution, SolarWinds Serv-U. The company's in-house security team discovered four critical flaws that allowed hackers to execute arbitrary code on the underlying system. In this article, we'll delve into the details of these vulnerabilities and the actions you can take to protect your business from potential attacks.
According to the security advisory, all four flaws were given a severity rating of 9.1/10 (critical) by SolarWinds. The identified vulnerabilities include:
- A “Broken Access Control RCE flaw” tracked as CVE-2025-40538
- Two type confusion RCE flaws (CVE-2025-40540, and CVE-2025-40539)
- An “Insecure Direct Object Reference RCE bug”, tracked as CVE-2025-40541
SolarWinds credited its in-house security team for discovering the vulnerabilities and released a patch to address them. The company urged all customers to upgrade immediately to versions 15.5.4, which includes fixes for these critical flaws.
Interestingly, SolarWinds stated that there is no evidence of these flaws being exploited in the wild at this time: “We have not observed exploitation. We remain committed to monitoring the situation, working closely with customers and partners to ensure issues are resolved quickly." The company emphasized its commitment to swift resolution of Critical Enterprise Vulnerabilities (CVEs) to guarantee software security and integrity.
The vulnerabilities cannot be found in CISA's Known Exploited Vulnerabilities (KEV) catalog at press time. However, managed file transfer solutions have long been a focal point for cyberattacks. For example, the MOVEit fiasco, where Russian ransomware operators Cl0p exploited a critical zero-day flaw in late May 2023, affected over 2,700 organizations worldwide and highlighted the risks of these vulnerabilities.
In conclusion, it is imperative to address this vulnerability update promptly as managed file transfer solutions are increasingly being targeted by hackers. SolarWinds Serv-U users should take immediate action to upgrade their software to versions 15.5.4, which includes fixes for these critical flaws. By doing so, they can minimize the risk of falling prey to future attacks and maintain the security and integrity of their business.
Stay informed about the latest cybersecurity news and trends with our newsletter. Sign up now and get access to expert insights, top tech deals, reviews, and more.