CVE-2021-35223
📋 TL;DR
CVE-2021-35223 is a remote code execution vulnerability in SolarWinds Serv-U File Server where user-supplied parameters in audit command execution can be exploited. This allows attackers to execute arbitrary commands on affected systems. Organizations running vulnerable versions of Serv-U File Server are affected.
💻 Affected Systems
- SolarWinds Serv-U File Server
📦 What is this software?
Serv U by Solarwinds
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining full control over the server, data exfiltration, lateral movement, and deployment of ransomware or other malware.
Likely Case
Unauthorized access to sensitive files, credential theft, installation of backdoors, and potential data breach.
If Mitigated
Limited impact with proper network segmentation, but still potential for file server compromise and data access.
🎯 Exploit Status
Exploitation requires some level of access to trigger audit events, but the vulnerability is straightforward to exploit once access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 15.2.4 and later
Vendor Advisory: https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35223
Restart Required: Yes
Instructions:
1. Download Serv-U 15.2.4 or later from SolarWinds portal. 2. Backup current configuration. 3. Run installer to upgrade. 4. Restart Serv-U services. 5. Verify version and functionality.
🔧 Temporary Workarounds
Disable Command Execution in Audit Events
allRemove or disable command execution functionality in audit/event settings
Navigate to Serv-U Admin Console > Settings > Auditing > Event Commands and remove any command configurations
Network Segmentation
allRestrict network access to Serv-U servers
Configure firewall rules to limit access to trusted IPs only
🧯 If You Can't Patch
- Implement strict network segmentation and firewall rules to limit access to Serv-U servers
- Disable command execution in audit events and monitor for any suspicious activity
🔍 How to Verify
Check if Vulnerable:
Check Serv-U version in Admin Console or via command line: serv-u --version
Check Version:
serv-u --version (Linux) or check About in Serv-U Admin Console (Windows)
Verify Fix Applied:
Verify version is 15.2.4 or higher and check that command execution in audit events is properly sanitized
📡 Detection & Monitoring
Log Indicators:
- Unusual command execution in Serv-U audit logs
- Suspicious process creation from Serv-U service
- Failed login attempts followed by command execution
Network Indicators:
- Unexpected outbound connections from Serv-U server
- Traffic to unusual ports from Serv-U host
SIEM Query:
source="serv-u" AND (event_type="command_execution" OR process_name="cmd.exe" OR process_name="powershell.exe")
🔗 References
- https://documentation.solarwinds.com/en/success_center/servu/content/release_notes/servu_15-2-4_release_notes.htm
- https://support.solarwinds.com/SuccessCenter/s/article/Execute-Command-Function-Allows-Remote-Code-Execution-RCE-Vulnerability-CVE-2021-35223?language=en_US
- https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35223
- https://documentation.solarwinds.com/en/success_center/servu/content/release_notes/servu_15-2-4_release_notes.htm
- https://support.solarwinds.com/SuccessCenter/s/article/Execute-Command-Function-Allows-Remote-Code-Execution-RCE-Vulnerability-CVE-2021-35223?language=en_US
- https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35223