This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor. Authentication is required to exploit this vulnerability. The specific flaw exists within the SolarWinds.Orion.Core.Actions.dll module. A crafted request can trigger execution of SQL queries composed from a user-supplied string. An attacker can leverage this vulnerability to escalate privileges to the level of an application administrator.
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds Orion Network Performance Monitor |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-21-1600 is categorized as high due to its potential for privilege escalation.
To fix ZDI-21-1600, update the SolarWinds Network Performance Monitor to the latest version provided by SolarWinds.
The potential impacts of ZDI-21-1600 include unauthorized access and privilege escalation on affected installations.
Yes, authentication is required to exploit ZDI-21-1600, making it less accessible to remote attackers without credentials.
ZDI-21-1600 affects SolarWinds Network Performance Monitor installations.