CyberWatch

Vulnerability in SolarWinds Managed File Transfer Server Actively Exploited

By

Matthew Fagan, VM Patch Analyst and Jarin Graff, VM Intern

By

Access Point Consulting

CVE-2024-28995

On June 5 of this year, SolarWinds released an update for a zero-day vulnerability for their Serv-U Managed File Transfer Server. The vulnerability is classified as a Local File Disclosure Directory Transversal vulnerability, which means attackers can exploit a path traversal issue. This is exploited by manipulating URL parameters in HTTP requests. Those HTTP requests bypass the directory checks, don’t require any authentication, and allow the attacker to access restricted files on the server. This vulnerability is actively exploited and spreading among real-world computers and can become a critical issue for companies that don’t apply the provided hotfix.

GreyNoise Labs setup two honeypots, that have been running for the last 3 months, are designed to simulate this vulnerability and catch attackers trying to exploit it. This tactic allowed them to oversee and study any attempt at exploitation with in the honeypots. They succeeded in capturing attackers’ payloads and the types of files being targeted.  The exploits observed and other attempt information can be found here.

Impact

This vulnerability can be exploited easily and has the potential to cause data leaks or compromise critical system files. It requires no authentication and is completed with a simple HTTP request directed to the vulnerable server. The vulnerability could impact data confidentiality and on worse cases even device integrity if the server is breached as a result.

Affected Software

SolarWinds Serv-U 15.4.2 HF 1 and previous versions for both Windows and Linux OS. This includes both FTP Severs and MFT Servers

Remediation   

SolarWinds has released a hotfix specifically for this vulnerability that requires a technician or engineer to apply as it is a manual installation on the server. The hotfix does require some preliminary analysis to determine if your server has the default configurations, if not you may have to adjust the hotfix steps to work for your specific server.

An important step to mention during the installation is backing up the necessary files involved in the hotfix, otherwise if an error occurs you won’t be able to revert the changes easily. Otherwise, the installation steps provided by SolarWinds is straight forwards and walks you through the entire process.

You can find the installation steps for the hotfix here.

Recommendations    

Patch and follow remediation guidelines: It is recommended that everyone who uses this SolarWinds service follow the recommended guidelines to apply the hotfix to your Serv-U servers.

Assess Risk: This vulnerability is easily exploitable with little effort from the attackers and can cause significant data leaks and potentially more damage if left untreated.

Implement Firewall Rules: This vulnerability requires no user interaction and doesn’t even need authentication when requesting files using the HTTP requests. So, if using the hotfix isn’t a viable option right away, consider implementing web application firewalls/adjust rules to block path traversal attempts from unexpected sources.

Associated Bulletins

https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28995

https://www.labs.greynoise.io/grimoire/2024-06-solarwinds-serv-u/

https://support.solarwinds.com/SuccessCenter/s/article/Serv-U-15-4-2-Hotfix-2-Release-Notes

Resources

CyberWatch

March 5, 2025

David Habib (Brightspot) | Building a culture of cybersecurity awareness

Cybersecurity awareness is often reduced to check-the-box training, but David Habib, CIO at Brightspot, argues that real security awareness isn’t about formal programs—it’s about making security part of a company’s culture. In this episode, he shares practical insights on how organizations can move beyond stale training sessions to create an engaged and security-conscious workforce.

Find out more
February 26, 2025

Lori Keller (Access Point Consulting) | Project management’s role in cybersecurity

Cybersecurity projects don’t just require technical expertise—they demand structured planning, risk management, and coordination across teams. Lori Keller, a practitioner in cybersecurity project management, joins CyberWatch to discuss how strong project management practices drive security success.

Find out more
February 19, 2025

Adithya Vellal (Petra Security) | Advancing cybersecurity maturity in the cloud

Cybersecurity maturity isn’t just about implementing tools—it’s about developing repeatable processes that align security with business objectives. Adithya Vellal, founder of Petra Security, joins CyberWatch to discuss how organizations can take a structured approach to cybersecurity, reduce risk, and communicate security priorities effectively.

Find out more