This vulnerability allows remote attackers to execute arbitrary code on affected installations of SolarWinds Network Performance Monitor. Authentication is required to exploit this vulnerability. The specific flaw exists within the ExecuteExternalProgram method. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of system.
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds Orion Network Performance Monitor |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-21-063 is considered critical due to its ability to allow remote attackers to execute arbitrary code.
To fix ZDI-21-063, update the SolarWinds Network Performance Monitor to the latest version that addresses this vulnerability.
ZDI-21-063 affects installations of SolarWinds Network Performance Monitor that have the vulnerability present.
Yes, authentication is required to exploit ZDI-21-063.
The flaw in ZDI-21-063 exists within the ExecuteExternalProgram method, allowing for arbitrary code execution.