CVE-2025-40541

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to run harmful code on the system as a privileged user, potentially taking full control of the Serv-U software. However, the attacker must already have administrative access to exploit this weakness, which makes it less risky on Windows systems where services typically run with lower privileges.

Technical Description

An Insecure Direct Object Reference (IDOR) vulnerability exists in Serv-U, which when exploited, gives a malicious actor the ability to execute native code as a privileged account. This issue requires administrative privileges to abuse. On Windows deployments, the risk is scored as a medium because services frequently run under less-privileged service accounts by default.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References