CVE-2021-35211
Serv-U Managed File Transfer Server vulnerability analysis and mitigation

Overview

Microsoft discovered a remote code execution (RCE) vulnerability (CVE-2021-35211) in the SolarWinds Serv-U Managed File Transfer and Serv-U Secure FTP for Windows products. The vulnerability was found in version 15.2.3 HF1 (released May 5, 2021) and all prior versions, affecting the SSH protocol implementation. The flaw was actively exploited in targeted attacks and was disclosed on July 9, 2021 (SolarWinds Advisory, Microsoft Blog).

Technical details

The vulnerability is a memory escape flaw in the way Serv-U implemented the Secure Shell (SSH) protocol. The issue stems from how Serv-U initially created an OpenSSL AES128-CTR context, which could allow the use of uninitialized data as a function pointer during SSH message decryption. The vulnerability can only be exploited if SSH is enabled and externally accessible. It received a CVSS v3.1 base score of 9.0 CRITICAL from SolarWinds and 10.0 CRITICAL from NVD (NVD, Tenable Blog).

Impact

If successfully exploited, an attacker could run arbitrary code with privileges on the affected system. This includes the ability to install malicious programs, view, change, or delete sensitive data, and execute commands with system privileges. The vulnerability only affects the machine hosting Serv-U and does not impact other parts of the customer's network (SolarWinds Advisory).

Mitigation and workarounds

SolarWinds released Serv-U version 15.2.3 HF2 to address the vulnerability. The upgrade path depends on the current version: users on 15.2.3 HF1 should apply HF2 directly; those on 15.2.3 should apply HF1 first, then HF2; users on versions below 15.2.3 need to upgrade to 15.2.3, then apply both hotfixes in sequence. If immediate patching is not possible, disabling SSH can serve as a temporary mitigation (SolarWinds Advisory).

Community reactions

Microsoft's disclosure of the vulnerability highlighted the continued targeting of SolarWinds products by state-sponsored threat actors, though this incident was unrelated to the previous SUNBURST supply chain attack. The cybersecurity community emphasized the critical nature of the vulnerability, particularly given its active exploitation and the large number of exposed systems (Hacker News).

Additional resources


SourceThis report was generated using AI

Related Serv-U Managed File Transfer Server vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-45711HIGH8.8
  • Serv-U Managed File Transfer ServerServ-U Managed File Transfer Server
  • cpe:2.3:a:solarwinds:serv-u
NoYesOct 16, 2024
CVE-2024-28995HIGH7.5
  • Serv-U Managed File Transfer ServerServ-U Managed File Transfer Server
  • cpe:2.3:a:solarwinds:serv-u
YesYesJun 06, 2024
CVE-2024-28072MEDIUM4.9
  • Serv-U Managed File Transfer ServerServ-U Managed File Transfer Server
  • cpe:2.3:a:solarwinds:serv-u
NoYesMay 03, 2024
CVE-2024-45714MEDIUM4.1
  • Serv-U Managed File Transfer ServerServ-U Managed File Transfer Server
  • cpe:2.3:a:solarwinds:serv-u
NoYesOct 16, 2024
CVE-2024-45712LOW2.6
  • Serv-U Managed File Transfer ServerServ-U Managed File Transfer Server
  • cpe:2.3:a:solarwinds:serv-u
NoYesApr 15, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management