Session Hijacking Vulnerability in SolarWinds N-central Software
CVE-2020-15909

8.8HIGH

Key Information:

Vendor
Solarwinds
Status
Vendor
CVE Published:
19 October 2020

Summary

SolarWinds N-central versions up to 2020.1 are susceptible to session hijacking due to inadequate checks on the JSESSIONID cookie. Attackers can exploit this vulnerability by stealing the JSESSIONID cookie when the user is logged in, allowing them to impersonate the victim. The affected system fails to validate the cookie against additional security measures, such as source IP checks or multi-factor authentication. This oversight enables unauthorized access and manipulation within N-central, a service that provides significant privileges. Proper cookie handling and robust authentication measures are critical to safeguarding the system against such attacks. For more details, visit SolarWinds MSP and related security resources.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.