Share This:

Threat Update

SolarWinds, an IT management and remote monitoring software developer that fell victim to the Sunburst supply chain attack, has been exploited again. However, the Serv-U zero day exploit is limited to targeted customer impact according to Microsoft. A patch has been released by SolarWinds in the Serv-U version 15.2.3 hotfix (HF) 2 update.

Technical Detail & Additional Information


Microsoft discovered SolarWinds’ Serv-U products Remote Memory Escape Vulnerability that can be exploited by remote code execution or RCE. Once exploited the threat actor can run arbitrary code with privileges that will allow them unauthorized access to install programs; view, change and delete data; and execute malicious code. This threat is limited to the SolarWinds Serv-U Managed File Transfer and Serv-U Secure FTP for Windows machines as the Linux version of the products will crash upon exploit attempt.


Serv-U Managed File Transfer Server and Serv-U Secured FTP is a multi-protocol file server capable of sending and receiving files from other networked computers. Although Serv-U products appear to be limited to a few consumers, more recently it seems threat actors have a tendency to target MSPs to gain access to multiple consumers.


The massive IT management and remote monitoring software company deploys their products to thousands of both public and private sector consumers. Microsoft has previously observed the China native threat actors, namely DEV-0322, targeting the U.S. Defense Industrial Base Sector and software companies. The combination of skilled threat actors, RCE vulnerability, and a massive software company that serves thousands of clients can lead to crippling ransomware attack for many. As previously mentioned, once exploited the attacker has the ability to alter data on an affected system.


Our SOC has implemented custom rules in our security monitoring platform to detect the indicators of compromise associated with the exploit. SolarWinds has recommended to update the Serv-U products to the Serv-U 15.2.3 HF2 as it has the patch for the Remote Memory Escape Vulnerability. SKOUT recommends:

  • Disable SSH access on the Serv-U installation.
  • Block the following IPs in your environment: 98[.]176[.]196[.]89; 68[.]235[.]178[.]32; 208[.]113[.]35[.]58; 144[.]34[.]179[.]162; 97[.]77[.]97[.]58
  • Update software to the latest version, Serv-U 15.2.3 HF2, for security updates and patches.


For more in-depth information about the recommendations, please visit the following links:

If you have any questions, please contact our Security Operations Center.

Share This:
Doris Au

Posted by Doris Au

Doris is a product marketing manager at Barracuda MSP. In this position, she is responsible for connecting managed service providers with multi-layered security and data protection products that can protect their customers from today’s advanced cyber threats.

Leave a reply

Your email address will not be published. Required fields are marked *