"Recent SolarWinds Serv-U Vulnerability Exploited in the Wild"

Threat actors are using publicly available Proof-of-Concept (PoC) code in their initial attempts to exploit a recently patched SolarWinds Serv-U vulnerability, according to the threat intelligence company GreyNoise. The exploited flaw is a severe directory traversal vulnerability that enables attackers to read sensitive files on the host machine. This article continues to discuss findings regarding threat actors' exploitation of a recent path traversal vulnerability in SolarWinds Serv-U using public PoC code.

SecurityWeek reports "Recent SolarWinds Serv-U Vulnerability Exploited in the Wild"

Submitted by grigby1
 

Submitted by grigby1 CPVI on