As a result of an unquoted service path vulnerability present in the Kiwi Syslog Server Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry. Example vulnerable path: "Computer\HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Kiwi Syslog Server\Parameters\Application".
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: SolarWinds

Published: 2021-10-25T13:00:29.724380Z

Updated: 2024-09-16T18:38:19.541Z

Reserved: 2021-06-22T00:00:00

Link: CVE-2021-35231

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2021-10-25T13:15:07.893

Modified: 2021-10-28T20:06:25.563

Link: CVE-2021-35231

cve-icon Redhat

No data.