Directory Traversal Remote Code Execution Vulnerability
CVE-2023-33226
8HIGH
Key Information:
- Vendor
- Solarwinds
- Vendor
- CVE Published:
- 1 November 2023
Summary
The Network Configuration Manager by SolarWinds is vulnerable to a directory traversal flaw that could be exploited by low-privileged users. This weakness allows attackers to execute commands with SYSTEM-level privileges, potentially compromising the integrity and security of the network environment. Users are recommended to update to the latest version and follow security best practices to mitigate risk.
Affected Version(s)
Network Configuration Manager 2023.3.1 and previous versions
References
CVSS V3.1
Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative