SolarWinds Fixes Severe Serv-U Vulnerability (CVE-2024-28995): Overview, Impact, and How IONIX Helps

By Nethanel Gelernter, Co-Founder and CTO | June 16, 2024

Introduction

SolarWinds recently addressed a critical security flaw, CVE-2024-28995, in its Serv-U Managed File Transfer and Secure FTP software. This directory traversal vulnerability, discovered by Hussein Daher, allows unauthenticated attackers to access sensitive files on the host system. The flaw is severe due to its remote exploitability and lack of required user interaction.

Understanding CVE-2024-28995

CVE-2024-28995 affects SolarWinds Serv-U versions up to 15.4.2 HF 1. Attackers can exploit this directory traversal flaw to access files and directories outside the web server’s root, potentially exposing system configurations and user credentials. The vulnerability is trivially exploitable and poses a high risk to organizations using affected versions.

Technical Details & Impact

SolarWinds’ Response

SolarWinds released Serv-U 15.4.2 HF 2 hotfix to patch the vulnerability. The update is available for both Windows and Linux (32/64-bit). Organizations are strongly advised to upgrade immediately.

Steps for Mitigation

  1. Update: Upgrade to Serv-U 15.4.2 HF 2 immediately.
  2. Patch Installation: Stop Serv-U processes, replace files as per instructions, restart the software.
  3. Verify Integrity: Check logs and monitor network traffic for signs of compromise.
  4. Regular Audits: Maintain up-to-date software and conduct regular security reviews.

For official guidance, see: SolarWinds Advisory, Help Net Security, Lodestone Security.

How IONIX Solves This Problem

You probably face challenges in rapidly identifying and validating exposure to new vulnerabilities like CVE-2024-28995 across your external attack surface. IONIX addresses these pain points by:

Why Choose IONIX for Vulnerability Management?

FAQ: IONIX Value & CVE-2024-28995

How does IONIX help me respond to new vulnerabilities like CVE-2024-28995?
IONIX provides instant visibility into all potentially affected assets, validates exploitability, and delivers actionable remediation steps—integrated with your existing workflows.
What integrations does IONIX support for vulnerability management?
IONIX integrates with Jira, ServiceNow, Slack, Splunk, Microsoft Sentinel, Palo Alto Cortex/Demisto, AWS services, and more. See all integrations.
How quickly can IONIX be deployed to address urgent threats?
Initial deployment takes about a week and requires only one person to scan your entire network.
What support is available if I discover exposure to CVE-2024-28995?
IONIX provides technical support, a dedicated account manager, and regular review meetings to ensure smooth remediation and ongoing protection.
Is IONIX compliant with security standards?
Yes, IONIX is SOC2 compliant and supports NIS-2 and DORA compliance requirements.

Customer Success Stories

Conclusion & Next Steps

The rapid disclosure and patching of CVE-2024-28995 underscores the importance of continuous attack surface management and fast response. IONIX empowers organizations to:

Ready to assess your exposure? Request a free scan or watch a short IONIX demo to see how easy it is to implement a CTEM program and fix exploits fast.

About IONIX

Go back to All Blog posts

SolarWinds Fixes Severe Serv-U Vulnerability (CVE-2024-28995): Overview and Response Guide 

Nethanel Gelernter
Nethanel Gelernter Co-Founder and CTO LinkedIn
June 16, 2024
Breaking news alert from Ionix about a zero-day vulnerability update for a severe Serv-U vulnerability (CVE-2024-28995), providing an overview and response guide.

Introduction 

SolarWinds has recently addressed a critical security flaw, designated as CVE-2024-28995, in its Serv-U Managed File Transfer and Secure FTP software. This vulnerability, discovered by Hussein Daher, involves a directory traversal flaw that allows unauthenticated attackers to access sensitive files on the host system. 

Understanding CVE-2024-28995 

CVE-2024-28995 exploits a directory traversal vulnerability in SolarWinds Serv-U versions up to 15.4.2 HF 1. Directory traversal vulnerabilities permit attackers to access files and directories that are stored outside the web server’s root directory. The attackers can read sensitive information which could lead to further exploits or system compromises. 

Technical Details and Impact 

The flaw was particularly severe because it can be exploited remotely without requiring user interaction, making it trivially exploitable. The vulnerability has a high severity rating due to its potential to provide attackers access to sensitive data such as system configurations and user credentials. 

SolarWinds’ Response 

In response to this vulnerability, last week SolarWinds issued a hotfix, Serv-U 15.4.2 HF 2, which patches the flaw and is essential for mitigating potential threats. The hotfix is applicable to both Windows and Linux operating systems across 32-bit and 64-bit architectures. 

Steps for Mitigation 

  1. Update to the Latest Version: Organizations using Serv-U should immediately upgrade to version 15.4.2 HF 2 to close the security gap left by CVE-2024-28995. 
  1. Patch Installation: After downloading the hotfix, system administrators should: 
  • Stop all Serv-U processes. 
  • Replace the necessary files as detailed in the hotfix instructions. 
  • Restart the Serv-U software. 
  1. Verify System Integrity: After applying the hotfix, it’s crucial to check system logs and monitor network traffic to ensure there are no signs of compromise or ongoing unauthorized activities. 
  1. Regular Security Audits: Regularly review and update all software to the latest versions and maintain rigorous security practices to protect against future vulnerabilities. 

IONIX Response 

For IONIX customers who are receiving a complete view of their external attack surface, CVE-2024-28995 details are available in our Threat Center (link valid for logged-in customers and prospects) – this helps to understand if any related FQDNs (Fully Qualified Domain Names) in your infrastructure have been exploited. IONIX Security Research Team developed a payload to validate for our customers’ specific exploitable assets. IONIX also offers a free scan to those wishing to check for their exploitable FQDNs. 

Conclusion 

The proactive disclosure and patching of CVE-2024-28995 by SolarWinds highlights the critical nature of maintaining up-to-date systems and the importance of quick response to discovered vulnerabilities. Organizations should continually assess their exposure to such vulnerabilities and swiftly apply recommended patches and updates to safeguard their information systems. IONIX customers have exploit simulation tools to assess their risk and to help remediate. 

For detailed guidance and technical documentation on the vulnerability and patch, refer to SolarWinds’ official advisory and support documentation (SolarWinds) (Help Net Security) (Lodestone Security) . 

WATCH A SHORT IONIX DEMO

See how easy it is to implement a CTEM program with IONIX. Find and fix exploits fast.