<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Solarwinds — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/solarwinds/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 26 Feb 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/solarwinds/feed.xml" rel="self" type="application/rss+xml"/><item><title>Critical Vulnerabilities in SolarWinds Serv-U Allow Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-02-solarwinds-servu-rce/</link><pubDate>Thu, 26 Feb 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-02-solarwinds-servu-rce/</guid><description>Multiple critical vulnerabilities in SolarWinds Serv-U MFT and FTP Server allow remote code execution, potentially leading to system compromise.</description><content:encoded><![CDATA[<p>On February 25, 2026, the Centre for Cybersecurity Belgium (CCB) issued an advisory regarding four critical vulnerabilities (CVE-2025-40538, CVE-2025-40539, CVE-2025-40540, CVE-2025-40541) in SolarWinds Serv-U MFT and FTP Server. These vulnerabilities, if exploited, can lead to remote code execution (RCE) on the affected systems.  The Serv-U products are file transfer solutions widely used by organizations. While there&rsquo;s no current indication of active exploitation as of the advisory&rsquo;s release, the CCB anticipates potential exploitation attempts by threat actors, including ransomware groups, given their past interest in file transfer technologies. Exploitation on Windows deployments requires administrative privileges. The vulnerabilities affect SolarWinds Serv-U MFT and FTP Server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a Serv-U server, potentially through compromised credentials or other means.</li>
<li>Attacker exploits CVE-2025-40538 (broken access control) to create a system administrator user. This may involve sending a specially crafted request to the Serv-U server.</li>
<li>The attacker uses the newly created administrator account to gain administrative privileges.</li>
<li>Attacker exploits CVE-2025-40539 (type confusion) or CVE-2025-40540 (type confusion) to inject and execute arbitrary code. This could involve sending further malicious requests.</li>
<li>Alternatively, the attacker exploits CVE-2025-40541 (Insecure Direct Object Reference) to execute native code.</li>
<li>The attacker executes arbitrary commands on the server with root privileges.</li>
<li>The attacker establishes persistence via scheduled tasks or other mechanisms.</li>
<li>The attacker moves laterally within the network, exfiltrates sensitive data, deploys ransomware, or performs other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities allows attackers to execute arbitrary code with root privileges on the affected SolarWinds Serv-U servers. This could lead to full system compromise, data theft, ransomware deployment, and disruption of file transfer services.  The scope could affect organizations relying on Serv-U for critical file transfers. The CCB advisory highlights potential targeting by ransomware groups who have shown past interest in file transfer technologies.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch SolarWinds Serv-U MFT and FTP Server to version 15.5.4 or later to remediate CVE-2025-40538, CVE-2025-40539, CVE-2025-40540, and CVE-2025-40541 (SolarWinds advisories).</li>
<li>Enable and review Sysmon process creation logs for suspicious processes spawned by Serv-U processes to detect potential exploitation attempts.</li>
<li>Implement network monitoring to detect unusual traffic originating from Serv-U servers, which might indicate command and control activity after successful exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>solarwinds</category><category>serv-u</category><category>rce</category><category>vulnerability</category></item><item><title>Suspicious SolarWinds Child Process Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-solarwinds-child-process/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-solarwinds-child-process/</guid><description>Detection of unusual child processes spawned by SolarWinds processes may indicate malicious program execution, potentially bypassing security controls.</description><content:encoded><![CDATA[<p>This detection rule identifies suspicious child processes initiated by SolarWinds.BusinessLayerHost.exe or SolarWinds.BusinessLayerHostx64.exe, excluding known legitimate operations. Adversaries may exploit the trusted SolarWinds processes to execute unauthorized programs with elevated privileges, bypassing security controls. The rule focuses on Windows systems and is designed to detect activity indicative of post-compromise actions following a supply chain attack. This detection is crucial for organizations that utilize SolarWinds software, as malicious actors could leverage compromised SolarWinds installations to gain unauthorized access and execute arbitrary code within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of the SolarWinds software supply chain (T1195.002).</li>
<li>Malicious code is injected into SolarWinds.BusinessLayerHost.exe or SolarWinds.BusinessLayerHostx64.exe.</li>
<li>The compromised SolarWinds process spawns a suspicious child process.</li>
<li>The child process executes a malicious command or binary, attempting to evade detection.</li>
<li>The child process leverages Native APIs (T1106) to perform privileged actions.</li>
<li>Lateral movement or data exfiltration may occur from the compromised host.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the execution of arbitrary code on systems running SolarWinds software. This can result in data theft, system compromise, and further propagation of the attack throughout the network. Organizations in various sectors utilizing SolarWinds products are potentially at risk. The impact may include loss of sensitive data, disruption of critical services, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Suspicious SolarWinds Child Process - CommandLine</code> to detect potentially malicious child processes of SolarWinds.BusinessLayerHost.exe or SolarWinds.BusinessLayerHostx64.exe.</li>
<li>Deploy the Sigma rule <code>Suspicious SolarWinds Child Process - Executable</code> to detect execution of unusual executables as child processes of SolarWinds.BusinessLayerHost.exe or SolarWinds.BusinessLayerHostx64.exe.</li>
<li>Enable process creation logging with command line details on Windows systems to ensure the Sigma rules have sufficient data.</li>
<li>Review and tune the rules for false positives based on legitimate SolarWinds child processes in your environment, updating the exclusion lists in the rules accordingly, referencing the &ldquo;false_positives&rdquo; section in the rule description.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>supply-chain</category><category>execution</category><category>solarwinds</category></item><item><title>SolarWinds Process Disabling Services via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-solarwinds-service-disable/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-solarwinds-service-disable/</guid><description>A SolarWinds binary is modifying the start type of a service to be disabled via registry modification, potentially to disable or impair security services.</description><content:encoded><![CDATA[<p>This threat brief focuses on the detection of SolarWinds processes attempting to disable services by modifying their registry start type. This activity is associated with defense evasion tactics, potentially linked to initial access via supply chain compromise, similar to the SUNBURST campaign. The behavior involves SolarWinds binaries, such as <code>SolarWinds.BusinessLayerHost*.exe</code> and <code>NetFlowService*.exe</code>, manipulating registry entries related to service start configurations. This technique can be used to impair or disable security tools and services, allowing attackers to operate more freely within a compromised environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of the SolarWinds Orion platform, potentially through a supply chain attack.</li>
<li>Deployment of a malicious module or payload within the SolarWinds environment.</li>
<li>Execution of a SolarWinds process, such as <code>SolarWinds.BusinessLayerHost*.exe</code>.</li>
<li>The SolarWinds process modifies the registry to change the start type of a service.</li>
<li>The registry modification targets the <code>HKLM\SYSTEM\ControlSet*\Services\*\Start</code> path.</li>
<li>The <code>Start</code> value is set to &ldquo;4&rdquo; or &ldquo;0x00000004&rdquo;, which disables the targeted service.</li>
<li>Disabling critical security services allows the attacker to evade detection and further compromise the system.</li>
<li>Attacker achieves persistence and performs lateral movement, exfiltrating data or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the disabling of critical security services, such as antivirus, endpoint detection and response (EDR) agents, or other monitoring tools. This can significantly reduce the visibility of malicious activity within the network, potentially leading to data breaches, ransomware deployment, or other severe security incidents. The SolarWinds supply chain compromise affected numerous organizations globally, underscoring the potential impact of this type of attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>SolarWinds Process Disabling Services via Registry</code> to your SIEM to detect registry modifications by SolarWinds processes aimed at disabling services.</li>
<li>Enable Sysmon registry event logging to provide the necessary data for the Sigma rule to function effectively.</li>
<li>Review and harden access controls for SolarWinds processes to restrict their ability to modify critical system settings.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the affected service and the timeline of events surrounding the registry modification.</li>
<li>Utilize threat intelligence platforms to stay informed about known SolarWinds-related attack patterns and indicators of compromise (IOCs).</li>
<li>Monitor endpoints for unusual behavior by SolarWinds processes, including network connections, file modifications, and process creations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>solarwinds</category><category>defense-evasion</category><category>registry-modification</category><category>supply-chain</category></item></channel></rss>