SolarWinds Access Rights Manager Directory Traversal Remote Code Execution Vulnerability
CVE-2023-35187

8.8HIGH

Key Information:

Vendor
Solarwinds
Vendor
CVE Published:
19 October 2023

Summary

The SolarWinds Access Rights Manager is affected by a directory traversal vulnerability that enables unauthenticated users to execute arbitrary code remotely. This weakness could lead to significant security risks, allowing attackers to manipulate the system and access sensitive data. Organizations using affected versions should prioritize patching and implementing security best practices to mitigate potential threats.

Affected Version(s)

Access Rights Manager previous versions <= 2023.2.0.73

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) working with Trend Micro Zero Day Initiative
.