SolarWinds Access Rights Manager Directory Traversal Remote Code Execution Vulnerability
CVE-2023-35187
8.8HIGH
Summary
The SolarWinds Access Rights Manager is affected by a directory traversal vulnerability that enables unauthenticated users to execute arbitrary code remotely. This weakness could lead to significant security risks, allowing attackers to manipulate the system and access sensitive data. Organizations using affected versions should prioritize patching and implementing security best practices to mitigate potential threats.
Affected Version(s)
Access Rights Manager previous versions <= 2023.2.0.73
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) working with Trend Micro Zero Day Initiative