CVE-2025-40538:
CVE-2025-40538
A broken access control vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to create a system admin user and execute arbitrary code as a privileged account via do...
Overview
A critical security flaw has been identified in Serv-U file transfer software. This vulnerability involves broken access control, allowing a user with specific administrative permissions to create a new, fully privileged system administrator account and execute arbitrary code on the host system.
Vulnerability Explanation
In simple terms, this is a severe privilege escalation flaw. A malicious actor who has already compromised a “domain admin” or “group admin” account within Serv-U can abuse these legitimate permissions in an unintended way. They can exploit this flaw to create a new “system admin” user account with the highest level of access. This new account can then be used to run any code or commands on the underlying server with elevated privileges.
It is crucial to note that exploiting this vulnerability requires the attacker to first obtain administrative credentials within Serv-U (domain or group admin). It cannot be exploited by a standard, unprivileged user.
Potential Impact
If successfully exploited, this vulnerability gives an attacker complete control over the Serv-U instance and the host operating system. The attacker can:
- Steal, modify, or delete all files managed by the Serv-U service.
- Install malicious software, such as ransomware or backdoors.
- Use the compromised server as a foothold to attack other systems on the network.
- Achieve persistent access by creating new, hidden administrator accounts.
The overall severity is rated as CRITICAL with a CVSS score of 9.1. For Windows deployments where Serv-U often runs under a less-privileged service account, the immediate risk of full system compromise may be reduced, scoring the local risk as Medium. However, the impact on the Serv-U application and all data it manages remains critical.
Remediation and Mitigation Advice
The primary and most urgent action is to apply the official security patch.
-
Immediate Patching: All users of affected Serv-U versions must upgrade to the latest version provided by the vendor (SolarWinds). Consult the official SolarWinds security advisory for the specific fixed versions and download links.
-
Principle of Least Privilege: Review and tighten the assignment of administrative roles within Serv-U. Ensure that only absolutely necessary personnel hold Domain Admin or Group Admin privileges. Regularly audit these accounts for suspicious activity.
-
Network Security: Restrict network access to the Serv-U administration interfaces. Ensure they are not exposed directly to the internet and are only accessible from trusted, internal networks.
-
Credential Hygiene: Enforce strong, unique passwords for all Serv-U administrative accounts and consider integrating with centralized identity management where possible.
-
Monitoring: Increase monitoring of authentication logs and user management events within Serv-U for any unauthorized creation or modification of administrator accounts.
Reference: CVE-2025-40538
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the database backup restore functionality extracts uploaded archive contents and copies files from the Images/ directo...
NovumOS is a custom 32-bit operating system written in Zig and x86 Assembly. In versions prior to 0.24, Syscall 15 (MemoryMapRange) allows Ring 3 user-mode processes to map arbitrary virtual address r...
Jellyfin is an open-source media system. The code-quality.yml GitHub Actions workflow in jellyfin/jellyfin-ios is vulnerable to arbitrary code execution via pull requests from forked repositories. Due...
The Listee theme for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.1.6. This is due to a broken validation check in the bundled listee-core plugin's user regi...