On July 13, 2021, Microsoft made the following announcement: “Microsoft has detected a 0-day remote code execution exploit being used to attack SolarWinds Serv-U FTP software in limited and targeted attacks. The Microsoft Threat Intelligence Center (MSTIC) attributes this campaign with high confidence to DEV-0322, a group operating out of China, based on observed victimology, tactics, and procedures.”
SailPoint does not use SolarWinds products or services and is not impacted by the vulnerability outlined above. If you have any further questions please reach out to your sales team or Customer Success Manager. If you are not sure who to contact, please send an email to compass-help@sailpoint.com and we will connect you with your representative.