This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor. Authentication is required to exploit this vulnerability. The specific flaw exists within the SendSyslog class. This class allows a crafted user-supplied string to be processed as an SQL statement. An attacker can leverage this vulnerability to escalate privileges to the level of an application administrator.
Affected Software | Affected Version | How to fix |
---|---|---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is ZDI-21-1604.
The severity of ZDI-21-1604 is high with a CVSS score of 8.8.
ZDI-21-1604 affects SolarWinds Network Performance Monitor.
Yes, authentication is required to exploit ZDI-21-1604.
You can learn more about ZDI-21-1604 by referring to the following references: [SolarWinds Security Advisory](https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35234) and [Zero Day Initiative Advisory](https://www.zerodayinitiative.com/advisories/ZDI-21-1604/).