| ID |
CVE-2025-40538
|
| Sažetak |
A broken access control vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to create a system admin user and execute arbitrary code as a privileged account via domain admin or group admin privileges.
This issue requires administrative privileges to abuse. On Windows deployments, the risk is scored as a medium because services frequently run under less-privileged service accounts by default. |
| Reference |
|
| CVSS |
| Base: | 9.1 |
| Impact: | 6.0 |
| Exploitability: | 2.3 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| NETWORK |
LOW |
HIGH |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| HIGH |
HIGH |
HIGH |
|
| CVSS vektor |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
| Zadnje važnije ažuriranje |
24-02-2026 - 17:51 |
| Objavljeno |
24-02-2026 - 08:16 |