Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Medium
SolarWinds Serv-U allows a remote attacker to execute arbitrary codes on an infected system. This is caused by an improper input validation error by the web login screen. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary codes on the system.
“During our sustained monitoring of threats taking advantage of the Log4j 2 vulnerabilities, we observed activity related to attacks being propagated via a previously undisclosed vulnerability in the SolarWinds Serv-U software. ” reads the advisory published by Microsoft.
According to the analysis posted by SolarWinds, Serv-U software allowed insufficiently sanitized characters through the LDAP authentication servers. The latest released version 15.3 addresses this vulnerability by performing sanitization and additional validation.
SolarWinds
Visit the following advisories released by Microsoft and SolarWinds to learn more about the vulnerability:
For patches, upgrades, and to download the latest version of Serv-U, visit: