SolarWinds Network Configuration Manager Directory Traversal Vulnerability
CVE-2023-23842
7.2HIGH
Key Information:
- Vendor
- Solarwinds
- Vendor
- CVE Published:
- 26 July 2023
Summary
The SolarWinds Network Configuration Manager is exposed to a directory traversal vulnerability that permits authenticated users with administrative privileges to execute unauthorized commands through the SolarWinds Web Console. This flaw could lead to serious security implications, enabling potential attackers to access restricted files and execute further malicious activities on the system. It is crucial for organizations using this software to apply the latest updates and patch this vulnerability to safeguard their network infrastructure.
Affected Version(s)
Network Configuration Manager 0 < 2023.3
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
SolarWinds would like to thank Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative for reporting on the issue in a responsible manner.