SolarWinds Access Rights Manager Deserialization of Untrusted Data Remote Code Execution Vulnerability
CVE-2023-35184
8.8HIGH
Summary
The SolarWinds Access Rights Manager is vulnerable to an exploit that enables unauthorized users to execute arbitrary code remotely. This flaw can be abused through a vulnerable SolarWinds service, allowing malicious actors to gain unauthorized control over affected systems. It is essential for users to apply the necessary patches and take proactive security measures to safeguard their environments against potential exploitation.
Affected Version(s)
Access Rights Manager previous versions <= 2023.2.0.73
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative