First published: Thu Sep 04 2014(Updated: )
SolarWinds Log and Event Manager before 6.0 uses "static" credentials, which makes it easier for remote attackers to obtain access to the database and execute arbitrary code via unspecified vectors, related to HyperSQL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds Security Event Manager | <=5.7.0 | |
SolarWinds Security Event Manager | =5.2.0 | |
SolarWinds Security Event Manager | =5.4.0 | |
SolarWinds Security Event Manager | =5.5.0 | |
SolarWinds Security Event Manager | =5.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5504 is classified as a high severity vulnerability due to the use of static credentials, which can lead to database access and arbitrary code execution.
To fix CVE-2014-5504, upgrade your SolarWinds Log and Event Manager to version 6.0 or later, which addresses the vulnerability.
CVE-2014-5504 affects all versions of SolarWinds Log and Event Manager prior to 6.0, including 5.2.0 to 5.7.0.
CVE-2014-5504 can facilitate remote attacks that exploit static credentials for unauthorized database access and arbitrary code execution.
The potential impacts of CVE-2014-5504 include data theft, integrity compromise, and unauthorized control over the affected databases.