CVE-2021-35250
📋 TL;DR
CVE-2021-35250 is a directory traversal vulnerability in SolarWinds Serv-U FTP server that allows attackers to access files outside the intended directory structure. This affects Serv-U 15.3 installations, potentially exposing sensitive server files and configuration data. Organizations running vulnerable versions of Serv-U are at risk.
💻 Affected Systems
- SolarWinds Serv-U
📦 What is this software?
Serv U by Solarwinds
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access sensitive system files, configuration files, or authentication data, potentially leading to complete server compromise and lateral movement within the network.
Likely Case
Unauthorized access to server configuration files, logs, and potentially sensitive data stored in accessible directories, enabling further reconnaissance or data exfiltration.
If Mitigated
Limited access to non-critical files with proper access controls and monitoring in place, though the vulnerability still presents an initial foothold risk.
🎯 Exploit Status
Directory traversal vulnerabilities typically have low exploitation complexity, though specific exploit details for this CVE haven't been publicly documented.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Serv-U 15.3 Hotfix 1
Vendor Advisory: https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35250
Restart Required: Yes
Instructions:
1. Download Serv-U 15.3 Hotfix 1 from SolarWinds Customer Portal. 2. Stop Serv-U service. 3. Apply the hotfix. 4. Restart Serv-U service. 5. Verify version shows 15.3 Hotfix 1.
🔧 Temporary Workarounds
Restrict Access Controls
allImplement strict access controls and file permissions to limit what directories Serv-U can access
Network Segmentation
allIsolate Serv-U servers from sensitive network segments and restrict inbound access
🧯 If You Can't Patch
- Implement strict network access controls to limit who can connect to Serv-U servers
- Enable detailed logging and monitoring for unusual file access patterns
🔍 How to Verify
Check if Vulnerable:
Check Serv-U version in administration console or via 'serv-u --version' command. If version is exactly 15.3.0, the system is vulnerable.
Check Version:
serv-u --version (Linux) or check Serv-U Administration Console (Windows)
Verify Fix Applied:
Verify version shows '15.3 Hotfix 1' in administration console or via version command. Test directory traversal attempts should be blocked.
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns in Serv-U logs
- Multiple failed directory traversal attempts
- Access to files outside normal FTP directory structure
Network Indicators:
- Unusual patterns of file requests containing '../' sequences
- Multiple failed file access attempts from single source
SIEM Query:
source="serv-u" AND ("../" OR "..\" OR "directory traversal")
🔗 References
- https://support.solarwinds.com/SuccessCenter/s/article/Serv-U-15-3-HotFix-1?language=en_US
- https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35250
- https://support.solarwinds.com/SuccessCenter/s/article/Serv-U-15-3-HotFix-1?language=en_US
- https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35250