Oct. 19, 2023, 5 a.m. |

ZDI: Published Advisories www.zerodayinitiative.com

This vulnerability allows remote attackers to execute arbitrary code on affected installations of SolarWinds Access Rights Manager. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-35180.

access access rights arbitrary code attackers authentication code code execution cve cves cvss data deserialization exploit manager rating remote code remote code execution rights solarwinds untrusted vulnerability zdi

More from www.zerodayinitiative.com / ZDI: Published Advisories

Enterprise Security Architect

@ Proofpoint | Utah

Senior Incident Response and Digital Forensics Engineer

@ Danske Bank | Vilnius, Lithuania

SOC Analyst (Remote)

@ Bertelsmann | New York City, US, 10019

Risk Consulting - Protect Tech - Staff - IT Compliance - ISO-NIST-FISMA-PCI DSS and Privacy

@ EY | Bengaluru, KA, IN, 560016

Security Officer Warrenpoint Harbour

@ TSS | Newry, County Down, United Kingdom

Senior DevSecOps Engineer

@ Scientific Systems Company, Inc. | Burlington, Massachusetts, United States