Article Details
Scrape Timestamp (UTC): 2024-06-20 15:48:26.163
Original Article Text
Click to Toggle View
SolarWinds Serv-U path-traversal flaw actively exploited in attacks. Threat actors are actively exploiting a SolarWinds Serv-U path-traversal vulnerability, leveraging publicly available proof-of-concept (PoC) exploits. Although the attacks do not appear particularly sophisticated, the observed activity underscores the risk posed by unpatched endpoints, emphasizing the urgent need for administrators to apply the security updates. The CVE-2024-28995 flaw The vulnerability, CVE-2024-28995, is a high-severity directory traversal flaw, allowing unauthenticated attackers to read arbitrary files from the filesystem by crafting specific HTTP GET requests. The vulnerability arises from insufficient validation of path traversal sequences, enabling attackers to bypass security checks and access sensitive files. The flaw impacts the following SolarWinds products: Older versions (15.3.2 and earlier) are also affected but will reach the end of life in February 2025 and are already unsupported. Exploiting the flaw may expose sensitive data from unauthorized file access, potentially leading to extended compromise. SolarWinds released the 15.4.2 Hotfix 2, version 15.4.2.157, on June 5, 2024, to address this vulnerability by introducing improved validation mechanisms. Public exploits available Over the weekend, Rapid7 analysts published a technical write-up that provided detailed steps to exploit the directory traversal vulnerability in SolarWinds Serv-U to read arbitrary files from the affected system. A day later, an independent Indian researcher released a PoC exploit and a bulk scanner for CVE-2024-28995 on GitHub. On Monday, Rapid7 warned about how trivial the flaw is to exploit, estimating the number of internet-exposed and potentially vulnerable instances between 5,500 and 9,500. GreyNoise set up a honeypot that mimics a vulnerable Serv-U system to monitor and analyze exploitation attempts for CVE-2024-28995. The analysts observed various attack strategies, including hands-on keyboard actions indicating manual attempts to exploit the vulnerability, as well as automated attempts. Attackers use platform-specific path traversal sequences, bypassing security checks using incorrect slashes, which the Serv-U system later corrects, allowing unauthorized file access. Typical payloads on Windows are ‘GET /?InternalDir=/../../../../windows&InternalFile=win.ini’ and on Linux it’s ‘GET /?InternalDir=\..\..\..\..\etc&InternalFile=passwd.’ The most frequently targeted files seen by Greynoise are: Attackers target those files to escalate their privileges or explore secondary opportunities in the breached network. GreyNoise reports cases where the attackers appear to copy-paste exploits without testing, resulting in failed attempts. In other exploitation attempts from China, the attackers showcase persistence, adaptability, and better understanding. GreyNoise says they experimented with different payloads and formats for four hours and adjusted their approach based on server responses. With confirmed attacks underway, system administrators must apply the available fixes as soon as possible.
Daily Brief Summary
The CVE-2024-28995 vulnerability in SolarWinds Serv-U is being exploited, risking sensitive data through unauthorized file access.
Exploits and a proof-of-concept are publicly available, notably published by Rapid7 and an independent researcher.
The vulnerability allows unauthenticated attackers to read arbitrary files on the system using specific HTTP GET requests.
Over 5,500 to 9,500 internet-exposed instances may be vulnerable to this high-severity directory traversal flaw.
SolarWinds has released a hotfix (version 15.4.2.157) to address this vulnerability by enhancing validation mechanisms.
Attack attempts vary from manual to automated, with attackers adapting techniques based on server responses.
Files most targeted in these attacks are crucial for gaining elevated privileges or further network compromise.
SolarWinds urges system administrators to install the available updates promptly to mitigate the vulnerability.