First published: Thu Nov 09 2023(Updated: )
The Network Configuration Manager was susceptible to a Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows a low-level user to perform the actions with SYSTEM privileges. We found this issue was not resolved in CVE-2023-33226
Credit: psirt@solarwinds.com
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds Network Configuration Manager | <=2023.4 |
All Network Configuration Manager customers are advised to upgrade to the latest version of the Network Configuration Manager version 2023.4.1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40054 is a Directory Traversal Remote Code Execution Vulnerability in SolarWinds Network Configuration Manager.
CVE-2023-40054 has a severity rating of high (8 out of 10).
An attacker can exploit CVE-2023-40054 by performing directory traversal to execute arbitrary code with SYSTEM privileges.
Yes, CVE-2023-40054 has been fixed in the NCM 2023.4.1 release of SolarWinds Network Configuration Manager.
You can find more information about CVE-2023-40054 in the SolarWinds security advisories and release notes.