"Recent SolarWinds Serv-U Vulnerability Exploited in the Wild"
Threat actors are using publicly available Proof-of-Concept (PoC) code in their initial attempts to exploit a recently patched SolarWinds Serv-U vulnerability, according to the threat intelligence company GreyNoise. The exploited flaw is a severe directory traversal vulnerability that enables attackers to read sensitive files on the host machine. This article continues to discuss findings regarding threat actors' exploitation of a recent path traversal vulnerability in SolarWinds Serv-U using public PoC code.
SecurityWeek reports "Recent SolarWinds Serv-U Vulnerability Exploited in the Wild"
Submitted by grigby1
Submitted by Gregory Rigby
on