First published: Wed Feb 15 2023(Updated: )
Customers who had configured their polling to occur via Kerberos did not expect NTLM Traffic on their environment, but since we were querying for data via IP address this prevented us from utilizing Kerberos.
Credit: psirt@solarwinds.com
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds Server and Application Monitor | =2022.4 |
All SolarWinds Platform customers are advised to upgrade to the latest version of the SolarWinds Platform version 2023.1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-47508 is high with a severity value of 7.5.
CVE-2022-47508 affects SolarWinds Server and Application Monitor version 2022.4.
The impact of CVE-2022-47508 is that customers who had configured their polling to occur via Kerberos did not expect NTLM Traffic on their environment.
To fix CVE-2022-47508, it is recommended to refer to the release notes of SolarWinds Server and Application Monitor version 2023.1 and apply the necessary updates.
Yes, you can find more information about CVE-2022-47508 in the security advisories provided by SolarWinds.