First published: Tue Jul 21 2015(Updated: )
The RSM (aka RSMWinService) service in SolarWinds N-Able N-Central before 9.5.1.4514 uses the same password decryption key across different customers' installations, which makes it easier for remote authenticated users to obtain the cleartext domain-administrator password by locating the encrypted password within HTML source code and then leveraging knowledge of this key from another installation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds N-Able N-Central | <=9.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5610 is classified as a high severity vulnerability due to the exposure of sensitive passwords.
To fix CVE-2015-5610, upgrade SolarWinds N-Able N-Central to version 9.5.1.4514 or later.
CVE-2015-5610 allows remote authenticated users to obtain cleartext domain-administrator passwords, compromising system security.
CVE-2015-5610 affects SolarWinds N-Able N-Central versions up to 9.5, prior to the 9.5.1.4514 update.
Organizations using affected versions of SolarWinds N-Able N-Central are at risk from CVE-2015-5610 if remote authenticated users gain access.