First published: Fri Mar 01 2024(Updated: )
The SolarWinds Security Event Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows an unauthenticated user to abuse SolarWinds’ service, resulting in remote code execution.
Credit: psirt@solarwinds.com
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds Security Event Manager | ||
SolarWinds Security Event Manager | <2023.4.1 |
SolarWinds recommends that customers upgrade to the SolarWinds Security Event Manager 2023.4.1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0692 is classified as a critical vulnerability due to its potential for remote code execution by unauthenticated users.
To mitigate CVE-2024-0692, it is recommended to upgrade to the latest version of SolarWinds Security Event Manager beyond 2023.4.1.
CVE-2024-0692 allows attackers to execute remote code, potentially compromising the integrity and confidentiality of affected systems.
No, CVE-2024-0692 can be exploited by unauthenticated users, making it particularly dangerous.
CVE-2024-0692 affects all versions of SolarWinds Security Event Manager up to 2023.4.1.