Service Notices

All Notices > Security Notices > SolarWinds Serv-U Remote Code Execution Vulnerability (CVE-2021-35211)

SolarWinds Serv-U Remote Code Execution Vulnerability (CVE-2021-35211)

Jul 16, 2021 GMT+08:00

I. Overview

SolarWinds released a security notice disclosing a remote code execution vulnerability (CVE-2021-35211) in Serv-U Managed File Transfer Server and Serv-U Secured FTP. Attackers can exploit this vulnerability to run arbitrary code with privileges; install programs; view, modify, or delete data; and run programs on the affected system. This vulnerability has been exploited by attackers and the risk is high.

SolarWinds Serv-U is a widely used FTP server software. If you are a SolarWinds Serv-U user, check your system and implement timely security hardening.

Reference: https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35211

II. Severity

Severity: important

(Severity: low, moderate, important, and critical)

III. Affected Products

Affected versions:

SolarWinds Serv-U 15.2.3 HF1 and earlier versions

Secure version:

SolarWinds Serv-U 15.2.3 HF2

IV. Security Recommendations

This vulnerability has been fixed in newly released versions. If your service version falls into the affected range, upgrade it to a latest secure version.

https://support.solarwinds.com/SuccessCenter/s/article/Serv-U-15-2-3-HotFix-2

If the upgrade cannot be performed, disable the SSH function.

Note: Before fixing vulnerabilities, back up your files and conduct a thorough test.