First published: Thu Jun 06 2024(Updated: )
SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine.
Credit: psirt@solarwinds.com psirt@solarwinds.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rhinosoft Serv-U | ||
Rhinosoft Serv-U | <15.4.2 | |
Rhinosoft Serv-U | =15.4.2 | |
Rhinosoft Serv-U | =15.4.2-hotfix1 |
SolarWinds recommends that customers upgrade to SolarWinds Serv-U 15.4.2 HF 2 as soon as it becomes available.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28995 is classified as a high severity vulnerability due to its potential to expose sensitive information.
To fix CVE-2024-28995, update SolarWinds Serv-U to the latest version that addresses this vulnerability.
CVE-2024-28995 affects SolarWinds Serv-U versions up to and including 15.4.2.
CVE-2024-28995 allows attackers to conduct directory traversal attacks to read sensitive files on the host machine.
Yes, CVE-2024-28995 has been reported as actively exploited in the wild.