As a result of an unquoted service path vulnerability present in the Kiwi Syslog Server Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry. Example vulnerable path: "Computer\HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Kiwi Syslog Server\Parameters\Application".
Advisories
Source ID Title
EUVD EUVD EUVD-2021-21874 As a result of an unquoted service path vulnerability present in the Kiwi Syslog Server Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry. Example vulnerable path: "Computer\HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Kiwi Syslog Server\Parameters\Application".
Fixes

Solution

SolarWinds advises Kiwi Syslog Server customers to upgrade to the latest version (9.8) once it becomes generally available.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: SolarWinds

Published:

Updated: 2024-09-16T18:38:19.541Z

Reserved: 2021-06-22T00:00:00

Link: CVE-2021-35231

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-10-25T13:15:07.893

Modified: 2024-11-21T06:12:06.697

Link: CVE-2021-35231

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses