Ce mail provient de l'extérieur, restons vigilants

=====================================================================

                            CERT-Renater

                Note d'Information No. 2025/VULN815
_____________________________________________________________________

DATE                : 19/11/2025

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running SolarWinds Serv-U versions prior
                                     to 15.5.3.

=====================================================================
https://www.solarwinds.com/trust-center/security-advisories/cve-2025-40547
https://www.solarwinds.com/trust-center/security-advisories/cve-2025-40548
https://www.solarwinds.com/trust-center/security-advisories/cve-2025-40549
_____________________________________________________________________

SolarWinds Serv-U Logic Abuse - Remote Code Execution Vulnerability
(CVE-2025-40547)

Summary

A logic error vulnerability exists in Serv-U which when abused could
give a malicious actor with access to admin privileges the ability to
execute code.

This issue requires administrative privileges to abuse. On Windows
deployments, the risk is scored as a medium because services
frequently run under less-privileged service accounts by default.


Affected Products

SolarWinds Serv-U 15.5.2.2.102


Fixed Software Release

SolarWinds Serv-U 15.5.3


Advisory Details


Severity
9.1 Critical

Advisory ID
CVE-2025-40547
First Published
11/18/2025
Last Updated
11/18/2025
Fixed Version

SolarWinds Serv-U 15.5.3
CVSS Score

CVSS:9.1.AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

_____________________________________________________________________

SolarWinds Serv-U Broken Access Control - Remote Code Execution
Vulnerability (CVE-2025-40548)

Summary

A missing validation process exists in Serv U when abused, could give
a malicious actor with access to admin privileges the ability to
execute code.

This issue requires administrative privileges to abuse. On Windows
deployments, the risk is scored as a medium because services
frequently run under less-privileged service accounts by default.


Affected Products
SolarWinds Serv-U 15.5.2.2.102

Fixed Software Release
SolarWinds Serv-U 15.5.3


Advisory Details

Severity
9.1 Critical

Advisory ID
CVE-2025-40548

First Published
11/18/2025
Last Updated
11/18/2025
Fixed Version

SolarWinds Serv-U 15.5.3
CVSS Score

CVSS:9.1.AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
_____________________________________________________________________

SolarWinds Serv-U Path Restriction Bypass Vulnerability (CVE-2025-40549)

Summary

A Path Restriction Bypass vulnerability exists in Serv-U that when
abused, could give a malicious actor with access to admin privileges
the ability to execute code on a directory.

This issue requires administrative privileges to abuse. On Windows
systems, this scored as medium due to differences in how paths and
home directories are handled.


Affected Products
SolarWinds Serv-U 15.5.2.2.102

Fixed Software Release
SolarWinds Serv-U 15.5.3


Advisory Details

Severity
9.1 High

Advisory ID
CVE-2025-40549

First Published
11/18/2025
Last Updated
11/18/2025
Fixed Version

SolarWinds Serv-U 15.5.3
CVSS Score

CVSS:9.1.AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================




