Directory Traversal Remote Code Execution Vulnerability
CVE-2023-33226
8HIGH
Key Information
- Vendor
- Solarwinds
- Status
- Network Configuration Manager
- Vendor
- CVE Published:
- 1 November 2023
Summary
The Network Configuration Manager was susceptible to a Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows a low-level user to perform the actions with SYSTEM privileges.
Affected Version(s)
Network Configuration Manager = 2023.3.1 and previous versions
CVSS V3.1
Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Risk change from: 8.8 to: 8 - (HIGH)
Vulnerability published.
Vulnerability Reserved.
Collectors
NVD DatabaseMitre Database
Credit
Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative