CVE-2021-35211

9.0 CRITICAL

📋 TL;DR

This is a critical remote code execution vulnerability in SolarWinds Serv-U products that allows attackers to execute arbitrary code with SYSTEM privileges on affected servers. It affects SolarWinds Serv-U Managed File Transfer and Serv-U Secure FTP for Windows versions before 15.2.3 HF2. The vulnerability was actively exploited as a zero-day before patches were available.

💻 Affected Systems

Products:
  • SolarWinds Serv-U Managed File Transfer
  • SolarWinds Serv-U Secure FTP
Versions: All versions before 15.2.3 HF2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows versions of Serv-U. The vulnerability is in the core Serv-U service running with SYSTEM privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the affected server with SYSTEM privileges, enabling lateral movement, data exfiltration, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Full system compromise of the Serv-U server, allowing attackers to steal credentials, access sensitive files, and use the server as a foothold for further network attacks.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege, and monitoring are in place, though the server would still be compromised.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

This was exploited as a zero-day by threat actors before patches were available. Microsoft reported active exploitation in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 15.2.3 HF2 and later

Vendor Advisory: https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35211

Restart Required: Yes

Instructions:

1. Download Serv-U 15.2.3 HF2 or later from SolarWinds Customer Portal. 2. Stop the Serv-U service. 3. Run the installer. 4. Restart the Serv-U service. 5. Verify the version is 15.2.3 HF2 or newer.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Serv-U servers to only trusted IP addresses and required users.

Use firewall rules to block all inbound traffic except from authorized sources

Service Account Hardening

windows

Configure Serv-U to run with a non-SYSTEM service account with minimal privileges.

sc config "Serv-U" obj= "NT AUTHORITY\LocalService" password= ""

🧯 If You Can't Patch

  • Immediately isolate affected servers from the internet and restrict internal network access
  • Implement strict monitoring and alerting for suspicious activity on Serv-U servers

🔍 How to Verify

Check if Vulnerable:

Check Serv-U version in the application interface or via the Windows Services console. If version is below 15.2.3 HF2, the system is vulnerable.

Check Version:

sc query "Serv-U" | findstr "DISPLAY_NAME"

Verify Fix Applied:

Verify the Serv-U version shows 15.2.3 HF2 or later in the application interface or Windows Services properties.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from Serv-U service
  • Failed authentication attempts followed by successful exploitation
  • Unusual network connections from Serv-U server

Network Indicators:

  • Unexpected outbound connections from Serv-U server
  • Traffic to known malicious IPs from Serv-U server
  • Anomalous protocol usage on Serv-U ports

SIEM Query:

source="Serv-U" AND (event_id=4688 OR process_creation) AND (parent_process="Serv-U.exe" OR image="cmd.exe" OR image="powershell.exe")

🔗 References

📤 Share & Export