First published: Thu Feb 11 2021(Updated: )
This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor 2020 HF1, NPM: 2020.2. Authentication is required to exploit this vulnerability. The specific flaw exists within the WriteToFile method. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to escalate privileges and reset the password for the Admin user. Was ZDI-CAN-11804.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds Network Performance Monitor | ||
SolarWinds Network Performance Monitor | =2020-hotfix1 | |
SolarWinds Network Performance Monitor | =2020.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this SolarWinds Network Performance Monitor vulnerability is CVE-2020-27869.
CVE-2020-27869 has a severity rating of 8.8 (Critical).
Remote attackers can exploit CVE-2020-27869 by escalating privileges on affected installations of SolarWinds Network Performance Monitor 2020 HF1, NPM: 2020.2. Authentication is required to exploit this vulnerability.
The affected software for CVE-2020-27869 is SolarWinds Network Performance Monitor 2020 HF1, NPM: 2020.2.
Yes, it is recommended to update SolarWinds Network Performance Monitor to a version that addresses this vulnerability. Please refer to the vendor's website for the appropriate patches or updates.