SolarWinds Security Event Manager Vulnerable to Remote Code Execution

CVE-2024-0692
8.8HIGH

Key Information

Vendor
Solarwinds
Status
Security Event Manager
Vendor
CVE Published:
1 March 2024

Badges

😄 Trended📰 News Worthy

Summary

The SolarWinds Security Event Manager is vulnerable to remote code execution due to a flaw in the handling of untrusted data. This flaw allows attackers to take complete control of vulnerable installations, potentially leading to compromising sensitive data, injecting additional malware, disrupting critical operations, and pivoting to other systems within the network. The severity of this vulnerability is highlighted by its CVSS score of 8.8. The vulnerability was discovered by anonymous researchers working with Trend Micro’s Zero Day Initiative (ZDI), and SolarWinds has released a patch to address the issue in version 2023.4.1 of the Security Event Manager. Organizations using SEM are advised to update their software immediately to mitigate the risk.

Affected Version(s)

Security Event Manager = 2023.4 and previous versions

News Articles

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability started trending.

  • First article discovered by securityonline.info

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database2 News Article(s)

Credit

Anonymous working with Trend Micro Zero Day Initiative
.