{"id":20635,"date":"2021-07-13T18:51:44","date_gmt":"2021-07-13T16:51:44","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=20635"},"modified":"2022-11-04T11:45:48","modified_gmt":"2022-11-04T10:45:48","slug":"solarwinds-patcht-kritische-serv-u-schwachstelle-juli-2021","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2021\/07\/13\/solarwinds-patcht-kritische-serv-u-schwachstelle-juli-2021\/","title":{"rendered":"SolarWinds patches critical Serv-U vulnerability (July 2021)"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2021\/07\/13\/solarwinds-patcht-kritische-serv-u-schwachstelle-juli-2021\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]US Vendor SolarWinds, hacked in 2020 and allowing attackers to infiltrate thousands of customer systems via Orion software, has now closed a 0-day vulnerability in Serv-U with an update. The remote execution vulnerability CVE-2021-35211, which occurs in the file transfer functions, has already been exploited in the wild.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg04.met.vgwort.de\/na\/4b2fe7a6d4794de2aed4ea91bed81578\" alt=\"\" width=\"1\" height=\"1\" \/>The vulnerability was discovered by Microsoft (see also the following <a href=\"https:\/\/twitter.com\/campuscodi\/status\/1414617089105612802\" target=\"_blank\" rel=\"noopener\">tweet<\/a>). Catalin Cimpanu has compiled the details in <a href=\"https:\/\/therecord.media\/microsoft-discovers-a-solarwinds-zero-day-exploited-in-the-wild\/\" target=\"_blank\" rel=\"noopener\">this article<\/a> &#8211; another post can be found at <a href=\"https:\/\/web.archive.org\/web\/20220517100111\/https:\/\/www.bleepingcomputer.com\/news\/security\/solarwinds-patches-critical-serv-u-vulnerability-exploited-in-the-wild\/\" target=\"_blank\" rel=\"noopener\">Bleeping Computer<\/a>.<\/p>\n<p><a href=\"https:\/\/twitter.com\/campuscodi\/status\/1414617089105612802\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"SolarWinds Serv-U vulnerability\" src=\"https:\/\/i.imgur.com\/j2meS3Q.png\" alt=\"SolarWinds Serv-U vulnerability\" \/><\/a><\/p>\n<p>Last week Friday (July 10, 2021), SolarWinds issued a <a href=\"https:\/\/www.solarwinds.com\/trust-center\/security-advisories\/cve-2021-35211\" target=\"_blank\" rel=\"noopener\">security advisory<\/a> addressing. The vendor was recently notified by Microsoft about a vulnerability related to Serv-U Managed File Transfer Server and Serv-U Secured FTP. As a result, a hotfix was developed to address this vulnerability. Although Microsoft's research indicates that this vulnerability is only being exploited by a limited number of customers and a single threat actor, the vulnerability was quickly addressed through a patch.<\/p>\n<p>The vulnerability exists in the latest Serv-U version 15.2.3 HF1, released on May 5, 2021, as well as all previous versions. An attacker who successfully exploited this vulnerability could execute arbitrary code with privileges. An attacker could then install programs; view, modify, or delete data; or run programs on the affected system.<\/p>\n<p>The vendor recommends customers install these updates immediately. Alternatively, SSH can be installed on affected products to prevent exploitation of the vulnerability. Further details can be found in the SolarWinds security advisory.<\/p>\n<p><strong>Addendum:<\/strong> Microsoft has published <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/07\/13\/microsoft-discovers-threat-actor-targeting-solarwinds-serv-u-software-with-0-day-exploit\/\" target=\"_blank\" rel=\"noopener\">this blog post<\/a>. The Microsoft Threat Intelligence Center (MSTIC) attributes this campaign with high confidence to DEV-0322, a group operating out of China, based on observed victimology, tactics, and procedures.<\/p>\n<p><strong>Similar articles:<\/strong><br \/>\n<a href=\"https:\/\/www.borncity.com\/blog\/2020\/12\/09\/fireeye-wenn-hacker-eine-sicherheitsfirma-plndern\/\">FireEye hacked, Red Team tools stolen<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/12\/14\/us-finanzministerium-und-weitere-us-behrde-gehackt\/\">US Treasury and US NTIA hacked<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/12\/14\/solarwinds-produkte-mit-sunburst-backdoor-ursache-fr-fireeye-und-us-behrden-hacks\/\">SolarWinds products with SunBurst backdoor, cause of FireEye and US government hacks?<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/12\/15\/sloppiness-at-solarwinds-responsible-for-compromised-software\/\">Sloppiness at SolarWinds responsible for compromised software?<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/12\/16\/neues-im-kampf-gegen-die-sunburst-infektion-domain-beschlagnahmt\/\">News in the fight against SUNBURST infection, domain seized<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/12\/17\/sunburst-malware-analytic-tool-solarflare-a-kill-switch-and-einsteins-fail\/\">SUNBURST malware: Analytic Tool SolarFlare, a 'Kill Switch' and EINSTEIN's fail<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/12\/17\/sunburst-malware-was-injected-into-solarwinds-source-code-base\/\">SUNBURST malware was injected into SolarWind's source code base<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/12\/18\/sunburst-hack-auch-us-atomwaffenbehrde-gehackt-neue-erkenntnisse\/\">SUNBURST: US nuclear weapons agency also hacked, new findings<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/12\/18\/solarwinds-hack-auch-microsoft-co-betroffen\/\">SolarWinds hack: Microsoft and others also affected?<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/12\/21\/sunburst-hack-microsofts-analysen-und-neues\/\">SUNBURST hack: Microsoft's analysis and news<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/12\/22\/solarwinds-systeme-mit-2-backdoor-gefunden\/\">2nd backdoor found on infected SolarWinds systems<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/01\/02\/solarwinds-hacker-hatten-zugriff-auf-microsoft-quellcode\/\">SolarWinds hackers had access to Microsoft source code<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/01\/05\/solarwinds-hack-motive-der-angreifer-outsourcing-als-schwachstelle\/\">SolarWinds hack: Hacker goals; outsourcing are under investigation?<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/01\/08\/neues-vom-solarwinds-hack-jetbrains-software-als-einfallstor\/\">News from the SolarWinds hack; JetBrains software as a gateway?<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/01\/12\/kaspersky-solarwinds-sunburst-backdoor-gleicht-russischer-atp-malware\/\">Kaspersky: SolarWinds Sunburst backdoor resembles Russian ATP malware<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/01\/14\/solarleaks-bietet-angeblich-sourcecode-von-cisco-microsoft-und-solarwinds-an\/\">SolarLeaks allegedly offers source code from Cisco, Microsoft and SolarWinds<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/01\/20\/auch-malwarebytes-von-den-solarwinds-angreifern-erfolgreich-gehackt\/\">Malwarebytes also successfully hacked by the SolarWinds attackers<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/01\/27\/vier-sicherheitsanbieter-besttigen-solarwinds-vorflle\/\">Four more security vendors confirm SolarWinds incidents<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/02\/27\/vorwurf-microsoft-hat-beim-solarwinds-hack-bei-der-sicherheit-gepatzt\/\">Accusation: Microsoft failed with security in the SolarWinds hack<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/03\/30\/solawwinds-update-fr-orion-software-angreifer-hatten-zugriff-auf-top-dhs-konten\/\">SolarWinds: Update for Orion software; attackers had access to top DHS accounts<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]US Vendor SolarWinds, hacked in 2020 and allowing attackers to infiltrate thousands of customer systems via Orion software, has now closed a 0-day vulnerability in Serv-U with an update. The remote execution vulnerability CVE-2021-35211, which occurs in the file transfer &hellip; <a href=\"https:\/\/borncity.com\/win\/2021\/07\/13\/solarwinds-patcht-kritische-serv-u-schwachstelle-juli-2021\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547,22],"tags":[69,1544,195],"class_list":["post-20635","post","type-post","status-publish","format-standard","hentry","category-security","category-software","category-update","tag-security","tag-software","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/20635","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=20635"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/20635\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=20635"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=20635"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=20635"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}