Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
Reference:
Advisory #2021-012
Version:
1.0
Affected software:
Serv-U 15.2.3 HF1 and older versions
Type:
Remote Code Execution (RCE)
CVE/CVSS:
CVE-2021-35211
https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35211
A threat actor who successfully exploits this vulnerability could run arbitrary code with privileges. An attacker could then install programs; view, change, or delete data; or run programs on the affected system.
A vulnerability has been found for Serv-U version 15.2.3 HF1 as well as earlier versions. Serv-U is a server and application monitoring software published by Solarwinds. The security vulnerability affects the Serv-U Managed File Transfer Server and the Serv-U Secured FTP software components. A threat actor who successfully exploits this vulnerability could run arbitrary code with privileges.
A hotfix has been made available by Solarwinds (15.2.3 HF2) and will be included in all future software updates.
The CCB recommends to all the system administrators to immediately update vulnerable Serv-U instances to the most recent build available (at least 15.2.3 HF2).
https://therecord.media/microsoft-discovers-a-solarwinds-zero-day-exploited-in-the-wild/