First published: Wed Apr 12 2017(Updated: )
In SolarWinds Log & Event Manager (LEM) before 6.3.1 Hotfix 4, a menu system is encountered when the SSH service is accessed with "cmc" and "password" (the default username and password). By exploiting a vulnerability in the restrictssh feature of the menuing script, an attacker can escape from the restricted shell.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds Security Event Manager | =6.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7722 is considered a high severity vulnerability due to its potential to allow attackers to gain unauthorized access.
To fix CVE-2017-7722, upgrade to SolarWinds Log & Event Manager version 6.3.1 Hotfix 4 or later.
CVE-2017-7722 affects SolarWinds Log & Event Manager versions prior to 6.3.1 Hotfix 4.
Exploiting CVE-2017-7722 can allow an attacker to escape from the restricted shell and gain root access to the system.
CVE-2017-7722 is likely to be exploited by malicious actors seeking unauthorized access to the SolarWinds Log & Event Manager.