Directory Traversal Remote Code Execution Vulnerability
CVE-2023-33227
8HIGH
Key Information:
- Vendor
- Solarwinds
- Vendor
- CVE Published:
- 1 November 2023
Summary
SolarWinds Network Configuration Manager is impacted by a Directory Traversal vulnerability that can be exploited by low-level users to execute commands with SYSTEM privileges. This weakness poses significant risks, allowing unauthorized access and control over the affected system. Implementing the latest security updates is crucial to mitigate the threats associated with this vulnerability.
Affected Version(s)
Network Configuration Manager 2023.3.1 and previous versions
References
CVSS V3.1
Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative