Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Qilin Ransomware Lists RDP Auth History on Enumerates Authentication
April 30, 2026
Phoenix PhaaS Fuels Brand Smishing in Finance Platform Drives
April 30, 2026
Targeted Large-Scale Campaign Attacking U.S. Organizations with
April 30, 2026
Home/Vulnerabilities/Critical SolarWinds Serv-U Flaws Vulnerabilities Enables
Vulnerabilities

Critical SolarWinds Serv-U Flaws Vulnerabilities Enables

Multiple critical vulnerabilities necessitate an urgent security update for the Serv-U file server software. If left unpatched, these flaws could allow attackers to fully compromise affected systems....

Sarah simpson
Sarah simpson
March 18, 2026 2 Min Read
0 0

Multiple critical vulnerabilities necessitate an urgent security update for the Serv-U file server software. If left unpatched, these flaws could allow attackers to fully compromise affected systems.

The latest release, Serv-U version 15.5.4, addresses four high-severity security flaws, each with a CVSS score of 9.1.

These vulnerabilities are especially dangerous because they enable remote code execution, granting attackers the highest level of administrative control over the targeted infrastructure.

Cybersecurity teams and system administrators are strongly urged to review the release notes and apply the updates immediately to prevent potential exploitation.

Serb-U Vulnerabilities Enable Root Access

The newly disclosed security flaws deeply affect the core functionality of the Serv-U application, enabling arbitrary native code execution with root privileges.

Among the most severe issues is a broken access control vulnerability that permits attackers with domain or group admin privileges to create a system admin user.

CVE CVSS Affected Component Affected Versions Impact
CVE-2025-40538 9.1 (Critical) Serv-U Core (Access Control) Serv-U (unpatched versions) Admin creation and root code execution.
CVE-2025-40539 9.1 (Critical) Serv-U Web Interface Serv-U (unpatched versions) Type confusion enables root code execution.
CVE-2025-40540 9.1 (Critical) Serv-U Web Interface Serv-U (unpatched versions) Type confusion enables root code execution.
CVE-2025-40541 9.1 (Critical) Serv-U API / Object Handling Serv-U (unpatched versions) IDOR flaw allows root code execution.

Once this unauthorized system-admin account is established, the attacker can execute malicious commands with root privileges.

Additionally, the software suffers from two distinct type confusion vulnerabilities. These memory corruption flaws provide a direct pathway for an attacker to run unauthorized native code as root.

Furthermore, the update addresses an Insecure Direct Object Reference vulnerability.

This specific flaw allows attackers to bypass authorization mechanisms by directly accessing internal objects, which, in turn, results in remote code execution with root privileges.

Because these vulnerabilities provide complete system control, threat actors could use them to deploy ransomware, steal sensitive enterprise data, or establish persistent backdoors within corporate networks.

SolarWinds has credited security researchers for responsibly disclosing these issues and working alongside their engineering teams to develop effective patches.

Product Enhancements and Update Recommendations

Alongside these critical security patches, Serv-U version 15.5.4 introduces several functional improvements and platform support updates.

The application now officially supports Ubuntu 24.04 LTS, expanding its deployment flexibility in enterprise environments.

SolarWinds has also reintroduced the download history feature in File Share, aligning it with the legacy web client capabilities. Additionally, the file share interface now includes a precise time display next to the last modified date.​

To further harden the application against modern web threats, SolarWinds implemented strict content security policy configurations.

The legacy login page now utilizes specific directives to prevent the application from being maliciously embedded in other websites, neutralizing potential clickjacking attacks.

Administrators using previous versions of Serv-U should consult the end-of-life schedule, as earlier versions, such as 15.5.1, reached the end of engineering support by February 18, 2026.

Organizations must download the latest installation files from the customer portal to ensure their infrastructure remains secure against these critical remote code execution threats.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVECybersecurityExploitPatchransomwareSecurityThreatVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

CISA Confirms Active Exploitation of File FileZen Vulnerability

Next Post

ScreenConnect Flaw: Hackers Extract Keys, Hijack Vulnerability Allows

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Google Gemini CLI Flaws Allow Remote Code Execution on Hosts
April 30, 2026
Jenkins Fixes High-Severity Plugin Flaws: Patches Including
April 30, 2026
WordPress Plugin Hacked Since 2020 to Inject Malicious
April 30, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us