First published: Thu Sep 07 2023(Updated: )
A vulnerability has been identified within Serv-U 15.4 and 15.4 Hotfix 1 that, if exploited, allows an actor to bypass multi-factor/two-factor authentication. The actor must have administrator-level access to Serv-U to perform this action. 15.4. SolarWinds found that the issue was not completely fixed in 15.4 Hotfix 1.
Credit: psirt@solarwinds.com psirt@solarwinds.com
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds Serv-U | =15.4.0 | |
SolarWinds Serv-U | =15.4.0-hotfix1 |
All SolarWinds Serv-U customers are advised to upgrade to the latest version of the SolarWinds Serv-U version 15.4 Hotfix 2
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2023-40060.
The severity of CVE-2023-40060 is high with a severity value of 7.2.
CVE-2023-40060 affects Serv-U 15.4.0 and 15.4.0 Hotfix 1.
The vulnerability allows an actor with administrator-level access to Serv-U to bypass multi-factor/two-factor authentication.
More information about CVE-2023-40060 can be found at the following references: [Reference 1](https://support.solarwinds.com/SuccessCenter/s/article/Serv-U-15-4-0-Hotfix-2?language=en_US), [Reference 2](https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-40060).