Remote Command Execution in SolarWinds Virtualization Manager
CVE-2016-3642
9.8CRITICAL
Summary
The RMI service in SolarWinds Virtualization Manager 6.3.1 and earlier is vulnerable to remote command execution attacks. This vulnerability arises from improper handling of serialized Java objects, particularly in the context of the Apache Commons Collections library. Attackers can exploit this weakness by sending specially crafted serialized objects, which can lead to arbitrary code execution on the server. Organizations using the affected versions should prioritize applying security updates to mitigate potential risks. For more information, refer to the detailed discussions in various security forums.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved