QID 730195

Date Published: 2021-10-07

QID 730195: SolarWinds Serv-U Remote Code Execution (RCE) Vulnerability

SolarWinds Serv-U Managed File Transfer Server is a versatile, easy-to-deploy solution that integrates well into existing infrastructure. It allows us to meet all our compliance requirements and ensures peace of mind for file transfers.

CVE-2021-35223: An attacker can abuse the FTP command SITE EXEC for command line obfuscation to conceal the payload which can launch remote code execution (RCE) from the Serv-U Server..

Affected Versions:
SolarWinds Serv-U prior to 15.2.4

QID Detection Logic(UnAuthenticated):
This QID checks the banner to detect if the device is running vulnerable SolarWinds Serv-U version or not.

Successful exploitation of this vulnerability may allow an attacker to execute arbitrary command on the target system.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as High - 6.5 severity.
  • Solution
    Customers are advised to install patches available on the vendor's website. For more information about patch and fixes visit Serv-U 15.2.4 Security Advisory.
    Vendor References

    CVEs related to QID 730195

    Software Advisories
    Advisory ID Software Component Link
    Serv-U 15.2.4 Security Advisory URL Logo www.solarwinds.com/trust-center/security-advisories/cve-2021-35223