9 CVE-2021-35211
CISA Kev Catalog Patch
Microsoft discovered a remote code execution (RCE) vulnerability in the SolarWinds Serv-U product utilizing a Remote Memory Escape Vulnerability. If exploited, a threat actor may be able to gain privileged access to the machine hosting Serv-U Only. SolarWinds Serv-U Managed File Transfer and Serv-U Secure FTP for Windows before 15.2.3 HF2 are affected by this vulnerability.
https://nvd.nist.gov/vuln/detail/CVE-2021-35211
Categories
CWE-787
References
134c704f-9b21-4f2e-91b3-4a467353bcc0
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-20... US Government Resource |
af854a3a-2127-422b-91ae-364da2661108 Patch
| https://www.microsoft.com/security/blog/2021/07/13/microsoft-discovers-threat... Patch Vendor Advisory |
| https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35211 Patch Vendor Advisory |
psirt@solarwinds.com Patch
| https://www.microsoft.com/security/blog/2021/07/13/microsoft-discovers-threat... Patch Vendor Advisory |
| https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35211 Patch Vendor Advisory |
CPE
| cpe | start | end |
|---|---|---|
| Configuration 1 | ||
| cpe:2.3:a:solarwinds:serv-u:*:*:*:*:*:*:*:* | < 15.2.3 | |
| cpe:2.3:a:solarwinds:serv-u:15.2.3:-:*:*:*:*:*:* | ||
| cpe:2.3:a:solarwinds:serv-u:15.2.3:hotfix1:*:*:*:*:*:* | ||
REMEDIATION
Patch
EXPLOITS
Exploit-db.com
| id | description | date | |
|---|---|---|---|
| No known exploits | |||
POC Github
| Url |
|---|
Other Nist (github, ...)
| Url |
|---|
| No known exploits |
CAPEC
Common Attack Pattern Enumerations and Classifications
| id | description | severity |
|---|---|---|
| No entry | ||
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
