The latest release, Serv-U version 15.5.4, addresses four high-severity security flaws, each with a CVSS score of 9.1.
These vulnerabilities are especially dangerous because they enable remote code execution, granting attackers the highest level of administrative control over the targeted infrastructure.
Cybersecurity teams and system administrators are strongly urged to review the release notes and apply the updates immediately to prevent potential exploitation.
The newly disclosed security flaws deeply affect the core functionality of the Serv-U application, enabling arbitrary native code execution with root privileges.
Among the most severe issues is a broken access control vulnerability that permits attackers with domain or group admin privileges to create a system admin user.
| CVE | CVSS | Affected Component | Affected Versions | Impact |
|---|---|---|---|---|
| CVE-2025-40538 | 9.1 (Critical) | Serv-U Core (Access Control) | Serv-U (unpatched versions) | Admin creation and root code execution. |
| CVE-2025-40539 | 9.1 (Critical) | Serv-U Web Interface | Serv-U (unpatched versions) | Type confusion enables root code execution. |
| CVE-2025-40540 | 9.1 (Critical) | Serv-U Web Interface | Serv-U (unpatched versions) | Type confusion enables root code execution. |
| CVE-2025-40541 | 9.1 (Critical) | Serv-U API / Object Handling | Serv-U (unpatched versions) | IDOR flaw allows root code execution. |
Once this unauthorized system-admin account is established, the attacker can execute malicious commands with root privileges.
Additionally, the software suffers from two distinct type confusion vulnerabilities. These memory corruption flaws provide a direct pathway for an attacker to run unauthorized native code as root.
Furthermore, the update addresses an Insecure Direct Object Reference vulnerability.
This specific flaw allows attackers to bypass authorization mechanisms by directly accessing internal objects, which, in turn, results in remote code execution with root privileges.
Because these vulnerabilities provide complete system control, threat actors could use them to deploy ransomware, steal sensitive enterprise data, or establish persistent backdoors within corporate networks.
SolarWinds has credited security researchers for responsibly disclosing these issues and working alongside their engineering teams to develop effective patches.
Alongside these critical security patches, Serv-U version 15.5.4 introduces several functional improvements and platform support updates.
The application now officially supports Ubuntu 24.04 LTS, expanding its deployment flexibility in enterprise environments.
SolarWinds has also reintroduced the download history feature in File Share, aligning it with the legacy web client capabilities. Additionally, the file share interface now includes a precise time display next to the last modified date.
To further harden the application against modern web threats, SolarWinds implemented strict content security policy configurations.
The legacy login page now utilizes specific directives to prevent the application from being maliciously embedded in other websites, neutralizing potential clickjacking attacks.
Administrators using previous versions of Serv-U should consult the end-of-life schedule, as earlier versions, such as 15.5.1, reached the end of engineering support by February 18, 2026.
Organizations must download the latest installation files from the customer portal to ensure their infrastructure remains secure against these critical remote code execution threats.
The post SolarWinds Critical Serv-U Vulnerabilities Enables Root Access appeared first on Cyber Security News.
A new bill may see May 17 become Bruce Lee Day in California, thanks to…
As our exclusive, all-February-long IGN First "cover story" on the upcoming black-and-white, hand-animated first-person shooter…
The Legend of Zelda turned 40 years old this week — though Nintendo has sadly…
“Burn it all down.” For a tagline so front and center of Paramount’s marketing for…
Video game deals have been popping up all over the place lately. Alongside PlayStation’s big…
This is Lowpass by Janko Roettgers, a newsletter on the ever-evolving intersection of tech and…
This website uses cookies.