New SolarWinds Zero-Day Vulnerability Used in Cyberattacks

2 years ago 41
BOOK THIS SPACE FOR AD
ARTICLE AD

13. July 2021

This article has been indexed from Softpedia News / Security

After being targeted by a massive supply chain attack in late 2020, SolarWinds issued new fixes to remedy a remote code execution vulnerability in the Serv-U controlled file transfer service, according to The Hacker News. 

The updates address Serv-U Managed File Transfer and Serv-U Secure FTP protocols and are being made available after Microsoft identified the vulnerability. It is not yet known who the threat actor behind the exploit is, nor how the attack was carried out, although the vulnerabilities were being used in the wild for some time.

Successful exploitation of the weakness (CVE-2021-35211) can enable an attacker to remove, read or alter sensitive data, and install malicious programs on the afflicted system. Both SSH connections from IP addresses 98.176.196.89 and 68.235.178.32 and TCP connections on port 443 to IP address 208.113.35.58 are factors that…

Read the original article: New SolarWinds Zero-Day Vulnerability Used in Cyberattacks

Read Entire Article