Critical Vulnerabilities in SolarWinds Serv-U Allow Remote Code Execution
Multiple critical vulnerabilities in SolarWinds Serv-U MFT and FTP Server allow remote code execution, potentially leading to system compromise.
On February 25, 2026, the Centre for Cybersecurity Belgium (CCB) issued an advisory regarding four critical vulnerabilities (CVE-2025-40538, CVE-2025-40539, CVE-2025-40540, CVE-2025-40541) in SolarWinds Serv-U MFT and FTP Server. These vulnerabilities, if exploited, can lead to remote code execution (RCE) on the affected systems. The Serv-U products are file transfer solutions widely used by organizations. While there’s no current indication of active exploitation as of the advisory’s release, the CCB anticipates potential exploitation attempts by threat actors, including ransomware groups, given their past interest in file transfer technologies. Exploitation on Windows deployments requires administrative privileges. The vulnerabilities affect SolarWinds Serv-U MFT and FTP Server.
Attack Chain
- Attacker gains initial access to a Serv-U server, potentially through compromised credentials or other means.
- Attacker exploits CVE-2025-40538 (broken access control) to create a system administrator user. This may involve sending a specially crafted request to the Serv-U server.
- The attacker uses the newly created administrator account to gain administrative privileges.
- Attacker exploits CVE-2025-40539 (type confusion) or CVE-2025-40540 (type confusion) to inject and execute arbitrary code. This could involve sending further malicious requests.
- Alternatively, the attacker exploits CVE-2025-40541 (Insecure Direct Object Reference) to execute native code.
- The attacker executes arbitrary commands on the server with root privileges.
- The attacker establishes persistence via scheduled tasks or other mechanisms.
- The attacker moves laterally within the network, exfiltrates sensitive data, deploys ransomware, or performs other malicious activities.
Impact
Successful exploitation of these vulnerabilities allows attackers to execute arbitrary code with root privileges on the affected SolarWinds Serv-U servers. This could lead to full system compromise, data theft, ransomware deployment, and disruption of file transfer services. The scope could affect organizations relying on Serv-U for critical file transfers. The CCB advisory highlights potential targeting by ransomware groups who have shown past interest in file transfer technologies.
Recommendation
- Immediately patch SolarWinds Serv-U MFT and FTP Server to version 15.5.4 or later to remediate CVE-2025-40538, CVE-2025-40539, CVE-2025-40540, and CVE-2025-40541 (SolarWinds advisories).
- Enable and review Sysmon process creation logs for suspicious processes spawned by Serv-U processes to detect potential exploitation attempts.
- Implement network monitoring to detect unusual traffic originating from Serv-U servers, which might indicate command and control activity after successful exploitation.
Detection coverage 2
Suspicious Process Spawned by Serv-U
highDetects suspicious processes spawned by Serv-U processes, potentially indicating exploitation.
Serv-U Creating System Admin User (CVE-2025-40538)
criticalDetects creation of a system admin user, which could indicate exploitation of CVE-2025-40538.
Detection queries are kept inside the platform. Get full rules →