Solarwinds

N-central

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.34%
  • Veröffentlicht 16.12.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 05:18:15

An issue was discovered in SolarWinds N-Central 12.3.0.670. Hard-coded Credentials exist by default for local user accounts named support@n-able.com and nableadmin@n-able.com. These allow logins to the N-Central Administrative Console (NAC) and/or th...

  • EPSS 0.21%
  • Veröffentlicht 16.12.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 05:18:15

An issue was discovered in SolarWinds N-Central 12.3.0.670. The local database does not require authentication: security is only based on ability to access a network interface. The database has keys and passwords.

  • EPSS 2.63%
  • Veröffentlicht 16.12.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 05:18:15

An issue was discovered in SolarWinds N-Central 12.3.0.670. The AdvancedScripts HTTP endpoint allows CSRF.

  • EPSS 10.97%
  • Veröffentlicht 16.12.2020 14:15:12
  • Zuletzt bearbeitet 21.11.2024 05:18:14

An issue was discovered in SolarWinds N-Central 12.3.0.670. The AdvancedScripts HTTP endpoint allows Relative Path Traversal by an authenticated user of the N-Central Administration Console (NAC), leading to execution of OS commands as root.

  • EPSS 2.63%
  • Veröffentlicht 16.12.2020 14:15:12
  • Zuletzt bearbeitet 21.11.2024 05:18:15

An issue was discovered in SolarWinds N-Central 12.3.0.670. The sudo configuration has incorrect access control because the nable web user account is effectively able to run arbitrary OS commands as root (i.e., the use of root privileges is not limit...

  • EPSS 0.8%
  • Veröffentlicht 16.12.2020 14:15:12
  • Zuletzt bearbeitet 21.11.2024 05:18:15

An issue was discovered in SolarWinds N-Central 12.3.0.670. The SSH component does not restrict the Communication Channel to Intended Endpoints. An attacker can leverage an SSH feature (port forwarding with a temporary key pair) to access network ser...

Exploit
  • EPSS 1.4%
  • Veröffentlicht 19.10.2020 13:15:13
  • Zuletzt bearbeitet 21.11.2024 05:06:25

SolarWinds N-central through 2020.1 allows session hijacking and requires user interaction or physical access. The N-Central JSESSIONID cookie attribute is not checked against multiple sources such as sourceip, MFA claim, etc. as long as the victim s...

  • EPSS 0.36%
  • Veröffentlicht 19.10.2020 13:15:13
  • Zuletzt bearbeitet 21.11.2024 05:06:26

SolarWinds N-Central version 12.3 GA and lower does not set the JSESSIONID attribute to HTTPOnly. This makes it possible to influence the cookie with javascript. An attacker could send the user to a prepared webpage or by influencing JavaScript to th...

Exploit
  • EPSS 0.8%
  • Veröffentlicht 26.01.2020 21:15:10
  • Zuletzt bearbeitet 21.11.2024 05:38:08

SolarWinds N-central before 12.1 SP1 HF5 and 12.2 before SP1 HF2 allows remote attackers to retrieve cleartext domain admin credentials from the Agent & Probe settings, and obtain other sensitive information. The attacker can use a customer ID to sel...