This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor. Authentication is required to exploit this vulnerability. The specific flaw exists within the SendSyslog class. This class allows a crafted user-supplied string to be processed as an SQL statement. An attacker can leverage this vulnerability to escalate privileges to the level of an application administrator.
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds Orion Network Performance Monitor |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-14859 is high due to the potential for privilege escalation by authenticated attackers.
ZDI-CAN-14859 affects installations of SolarWinds Network Performance Monitor.
To fix ZDI-CAN-14859, apply the latest security updates released by SolarWinds for Network Performance Monitor.
ZDI-CAN-14859 is a privilege escalation vulnerability requiring authentication to exploit.
Yes, ZDI-CAN-14859 can be exploited remotely by authenticated attackers.