First published: Wed Dec 05 2018(Updated: )
In SolarWinds SFTP/SCP Server through 2018-09-10, the configuration file is world readable and writable, and stores user passwords in an insecure manner, allowing an attacker to determine passwords for potentially privileged accounts. This also grants the attacker an ability to backdoor the server.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Solarwinds Sftp\/scp Server | <=20180910 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16791 is classified as a high severity vulnerability due to its impact on sensitive user credentials and potential server backdoor access.
To fix CVE-2018-16791, ensure that the configuration file is not world readable or writable and implement secure password storage practices.
The risks associated with CVE-2018-16791 include unauthorized access to sensitive accounts and the potential for an attacker to backdoor the SFTP/SCP server.
CVE-2018-16791 affects all versions of SolarWinds SFTP/SCP Server up to and including 2018-09-10.
Yes, CVE-2018-16791 can lead to data breaches as it exposes user passwords and allows for server backdoor exploitation.