Remote Code Execution Vulnerability in SolarWinds Network Performance Monitor
CVE-2021-31474

9.8CRITICAL

Key Information:

Vendor
Solarwinds
Vendor
CVE Published:
21 May 2021

Summary

This vulnerability affects SolarWinds Network Performance Monitor 2020.2.1, enabling remote attackers to execute arbitrary code without authentication. The flaw lies within the SolarWinds.Serialization library due to inadequate validation of user-supplied data, leading to the deserialization of untrusted data. An attacker can exploit this vulnerability to run code in the context of the SYSTEM account, which may compromise the integrity and security of the affected system.

Affected Version(s)

Network Performance Monitor 2020.2.1

References

EPSS Score

32% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Anonymous
.