First published: Fri Jun 07 2019(Updated: )
The local management interface in SolarWinds Serv-U FTP Server 15.1.6.25 has incorrect access controls that permit local users to bypass authentication in the application and execute code in the context of the Windows SYSTEM account, leading to privilege escalation. To exploit this vulnerability, an attacker must have local access the the host running Serv-U, and a Serv-U administrator have an active management console session.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Solarwinds Serv-u Ftp Server | =15.1.6.25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2018-19999.
CVE-2018-19999 has a severity rating of 7.8 (high).
The affected software of CVE-2018-19999 is SolarWinds Serv-U FTP Server version 15.1.6.25.
CVE-2018-19999 allows local users to bypass authentication and execute code in the context of the Windows SYSTEM account, leading to privilege escalation.
To fix the vulnerability CVE-2018-19999, upgrade SolarWinds Serv-U FTP Server to a version that has the necessary patches or fixes provided by the vendor.