First published: Fri May 21 2021(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of SolarWinds Orion Job Scheduler 2020.2.1 HF 2. Authentication is required to exploit this vulnerability. The specific flaw exists within the JobRouterService WCF service. The issue is due to the WCF service configuration, which allows a critical resource to be accessed by unprivileged users. An attacker can leverage this vulnerability to execute code in the context of an administrator. Was ZDI-CAN-12007.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds Orion Job Scheduler | ||
SolarWinds Orion Job Scheduler | =2020.2.1-hotfix2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-31475 has been assigned a high severity rating due to the potential for remote code execution.
To remediate CVE-2021-31475, ensure that you update SolarWinds Orion Job Scheduler to version 2020.2.1 Hotfix 3 or later.
CVE-2021-31475 affects installations of SolarWinds Orion Job Scheduler version 2020.2.1 Hotfix 2.
CVE-2021-31475 allows remote attackers to execute arbitrary code on affected systems after authentication.
Yes, authentication is required to exploit CVE-2021-31475.