First published: Tue May 17 2022(Updated: )
This broken access control vulnerability pertains specifically to a domain admin who can access configuration & user data of other domains which they should not have access to. Please note the admin is unable to modify the data (read only operation). This UAC issue leads to a data leak to unauthorized users for a domain, with no log of them accessing the data unless they attempt to modify it. This read-only activity is logged to the original domain and does not specify which domain was accessed.
Credit: psirt@solarwinds.com
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds Serv-U | <15.3.1 |
Serv-U Customers are advised to upgrade to the fix-version once it becomes generally available on May 17, 2022.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-35249 is a broken access control vulnerability in SolarWinds Serv-U that allows a domain admin to access configuration and user data of other domains they should not have access to.
The severity of CVE-2021-35249 is medium, with a CVSS score of 4.3.
CVE-2021-35249 affects SolarWinds Serv-U versions up to and excluding 15.3.1.
No, the domain admin can only perform read-only operations and cannot modify the data they access through CVE-2021-35249.
To fix CVE-2021-35249, it is recommended to upgrade SolarWinds Serv-U to version 15.3.1 or later.