radar

ONE Sentinel

securitySecurity/THREATS/CRIT

SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution

sourceThe Hacker News
calendar_todayFebruary 25, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

SolarWinds Urgently Patches Critical Serv-U Vulnerabilities Enabling Root Code Execution

Summary

SolarWinds has issued patches for four critical vulnerabilities in its Serv-U file transfer software. These flaws could allow attackers to execute remote code with root privileges if exploited.

Key Points

  • SolarWinds released updates for Serv-U to fix four critical vulnerabilities.
  • The vulnerabilities are rated 9.1 on the CVSS scale, indicating high severity.
  • CVE-2025-40538 is identified as a broken access control flaw allowing system admin user creation and arbitrary code execution.
  • Successful exploitation could lead to remote code execution with root privileges.

Analysis

The vulnerabilities in SolarWinds' Serv-U software represent a significant security risk due to their high CVSS score and potential for remote code execution. Given the widespread use of Serv-U for file transfers, these flaws could be a lucrative target for attackers seeking to gain unauthorized access to systems. The urgency of the patches highlights the critical nature of these vulnerabilities.

Conclusion

IT professionals should prioritize applying the latest patches from SolarWinds to mitigate these critical vulnerabilities in Serv-U. Regularly updating software and monitoring for suspicious activity are essential practices to enhance security posture.