Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2023-35185 : What You Need to Know

Discover the impact of CVE-2023-35185, a critical Directory Traversal Vulnerability in SolarWinds Access Rights Manager. Learn about the technical details and mitigation strategies.

A critical vulnerability, CVE-2023-35185, affecting SolarWinds Access Rights Manager has been discovered. Read on to understand the impact, technical details, and mitigation strategies.

Understanding CVE-2023-35185

CVE-2023-35185 is a Directory Traversal Remote Code Execution Vulnerability in SolarWinds Access Rights Manager, potentially allowing attackers to execute arbitrary code with SYSTEM privileges.

What is CVE-2023-35185?

The vulnerability in SolarWinds Access Rights Manager enables threat actors to perform remote code execution by exploiting a directory traversal flaw with elevated privileges.

The Impact of CVE-2023-35185

The impact of CVE-2023-35185, as classified under CAPEC-253 - Remote Code Inclusion, could lead to unauthorized access, data theft, and system compromise with a CVSS base score of 6.8.

Technical Details of CVE-2023-35185

The vulnerability is due to improper handling of user-supplied input, which allows malicious actors to navigate through the file system and execute arbitrary commands.

Vulnerability Description

SolarWinds Access Rights Manager was susceptible to a Directory Traversal Remote Code Vulnerability using SYSTEM privileges.

Affected Systems and Versions

SolarWinds Access Rights Manager versions prior to 2023.2.0.73 are impacted by this vulnerability.

Exploitation Mechanism

Attackers can exploit this vulnerability by crafting specific requests to navigate outside of the restricted directories and execute malicious code.

Mitigation and Prevention

To secure systems against CVE-2023-35185, immediate actions and long-term security practices need to be implemented.

Immediate Steps to Take

All SolarWinds Access Rights Manager users are urged to upgrade to version 2023.2.1 to mitigate the vulnerability and protect their systems.

Long-Term Security Practices

Regularly monitor for security advisories, implement access controls, and conduct security assessments to identify and remediate potential vulnerabilities.

Patching and Updates

Keep systems up to date with the latest security patches and software updates to prevent exploitation of known vulnerabilities.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now