SolarWinds Access Rights Manager Deserialization of Untrusted Data Remote Code Execution Vulnerability
CVE-2023-35180
8HIGH
Summary
The SolarWinds Access Rights Manager is vulnerable to a Remote Code Execution issue that can be exploited by authenticated users via the SolarWinds ARM API. This allows them to execute unauthorized commands, potentially compromising the integrity of the system and exposing sensitive data. Immediate attention is advised to mitigate the risks associated with this vulnerability and secure the overall network environment.
Affected Version(s)
Access Rights Manager previous versions <= 2023.2.0.73
References
CVSS V3.1
Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative