First published: Thu Nov 09 2023(Updated: )
The Network Configuration Manager was susceptible to a Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows a low-level user to perform the actions with SYSTEM privileges. We found this issue was not resolved in CVE-2023-33227
Credit: psirt@solarwinds.com
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds Network Configuration Manager | <=2023.4 |
All Network Configuration Manager customers are advised to upgrade to the latest version of the Network Configuration Manager version 2023.4.1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2023-40055.
The title of this vulnerability is SolarWinds Network Configuration Manager Directory Traversal Remote Code Execution Vulnerability.
The severity of CVE-2023-40055 is high.
The affected software for CVE-2023-40055 is SolarWinds Network Configuration Manager.
This vulnerability can be exploited through a Directory Traversal Remote Code Execution attack.