Critical (9.1)

CVE-2025-40540:

CVE-2025-40540

A type confusion vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to execute arbitrary native code as privileged account. This issue requires administrative pr...

Overview

A critical security flaw has been identified in Serv-U file transfer software. This vulnerability is a type of logic error (type confusion) that could allow an authenticated attacker with administrative privileges to execute arbitrary code on the underlying server with high privileges.

Vulnerability Explained

In simple terms, the software can be tricked into misinterpreting the type of data it is processing. By sending specially crafted commands, an attacker with an administrative account can exploit this confusion. This forces the software to execute malicious code of the attacker’s choosing on the host system, effectively giving them full control.

Potential Impact

The primary risk is complete system compromise. An attacker who successfully exploits this vulnerability could:

  • Install malicious software, including ransomware or spyware.
  • Create new user accounts with full privileges.
  • View, change, or delete sensitive data.
  • Use the compromised server as a foothold to attack other systems on the network.

Important Context on Severity: The CVSS score of 9.1 reflects the worst-case scenario. The critical factor is that exploitation requires the attacker to already possess administrative credentials for the Serv-U instance. On Windows systems, where the Serv-U service often runs under a dedicated, less-privileged account by default, the immediate risk is reduced to Medium, as the code execution would be constrained by that service account’s permissions. However, if the service is configured to run with higher privileges (like SYSTEM), or if administrative credentials are compromised, the impact becomes critical.

Remediation and Mitigation

Immediate action is required to protect your Serv-U deployment.

  1. Apply the Official Patch: SolarWinds has released a security update addressing this vulnerability. All users must upgrade to the patched version of Serv-U as soon as possible. Consult the official SolarWinds security advisory for the specific fixed versions.
  2. Restrict Administrative Access: Adhere to the principle of least privilege. Ensure that Serv-U administrative accounts are limited only to necessary, trusted personnel. Use strong, unique passwords and consider multi-factor authentication (MFA) if supported.
  3. Review Service Account Permissions: Verify the service account under which Serv-U runs. It should have the minimum permissions required for the software to function and no more. Avoid using highly privileged accounts like SYSTEM or a domain administrator.
  4. Monitor for Unauthorized Activity: Review authentication logs for any suspicious login attempts to Serv-U administrative interfaces. Monitor the server for unusual processes or network connections originating from the Serv-U service.

You should prioritize patching in any environment where Serv-U administrative credentials could be targeted or are not strictly controlled.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.