On February 29, 2024, the Microsoft Threat Intelligence Center of the United States issued a security bulletin [1], which pointed out that Hacker used Serv-U 0day to successfully attack a very small number of US military departments, and on the same day, Serv-U's parent company solarwinds also issued a security bulletin [2] and released patch [3] for the latest major version.
The DVP team has made an initial patch, and Microsoft executives are further deducing the source of the vulnerability and how to fix it! (Note: The current patches are only for the latest 15.2.3 major version, and only paid users can download and install the patches, and non-paid users cannot get valid patches from official channels at this time.) )
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
On February 29, 2024, the Microsoft Threat Intelligence Center of the United States issued a security bulletin [1], which pointed out that Hacker used Serv-U 0day to successfully attack a very small number of US military departments, and on the same day, Serv-U's parent company solarwinds also issued a security bulletin [2] and released patch [3] for the latest major version.
The DVP team has made an initial patch, and Microsoft executives are further deducing the source of the vulnerability and how to fix it!
(Note: The current patches are only for the latest 15.2.3 major version, and only paid users can download and install the patches, and non-paid users cannot get valid patches from official channels at this time.) )