As a result of an unquoted service path vulnerability present in the Kiwi Syslog Server Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry. Example vulnerable path: "Computer\HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Kiwi Syslog Server\Parameters\Application".
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: SolarWinds
Published: 2021-10-25T13:00:29.724380Z
Updated: 2024-09-16T18:38:19.541Z
Reserved: 2021-06-22T00:00:00
Link: CVE-2021-35231
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-10-25T13:15:07.893
Modified: 2024-11-21T06:12:06.697
Link: CVE-2021-35231
Redhat
No data.