![]() ![]() ![]() All Serv-U versions prior to v15.2.3 HF2, released on Friday, are vulnerable to attacks.We will not be reproducing them here in case SolarWinds updates the IOCs. SolarWinds shared some indicators of compromise (IOCs) related to the attacks in its security advisory.A Serv-U hotfix was released on Friday, Jv15.2.3 HF2.Neither SolarWinds nor Microsoft said when the attacks abusing CVE-2021-53211 started nor who was behind them.The Texas-based company said the vulnerable Serv-U technology was only included with the Serv-U Managed File Transfer and Serv-U Secure FTP products and that no other SolarWinds application is affected. Tracked as CVE-2021-35211, the vulnerability is a remote code execution (RCE) bug that can be exploited via the SSH protocol to run malicious code with elevated privileges on SolarWinds applications. The attacks and the vulnerability were discovered by Microsoft, SolarWinds said in a security advisory published over the weekend. US software company SolarWinds has released security updates on Saturday to patch a vulnerability in its Serv-U file transferring technology that is being actively exploited in the wild. The question: Did Microsoft unintentionally abet the cyberstrike? To get at that answer, we need to first take a close look at the SolarWinds attack.Microsoft discovers SolarWinds zero-day exploited in the wild And it has called for an international agreement to ban cyberattacks modeled after the Geneva Convention, which bans many weapons.īut now Microsoft is being called to task by critics, including a prominent US Senator, for actions they say might have helped exacerbate the Russian-backed SolarWinds cyberattack against the US government and industry. It has publicly berated the US National Security Agency (NSA) for stockpiling software and hardware vulnerabilities so they can be exploited instead of working with companies to fix them. In recent years, Microsoft has been in the forefront of the fight against governmental and foreign hacking, helping thwart countless attacks from Russian-linked attackers. Editor's note: This story has been updated with the correct number of government agencies and private companies attacked. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |