Description
As a result of an unquoted service path vulnerability present in the Kiwi Syslog Server Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry. Example vulnerable path: "Computer\HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Kiwi Syslog Server\Parameters\Application".
No analysis available yet.
Remediation
Vendor Solution
SolarWinds advises Kiwi Syslog Server customers to upgrade to the latest version (9.8) once it becomes generally available.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-21874 | As a result of an unquoted service path vulnerability present in the Kiwi Syslog Server Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry. Example vulnerable path: "Computer\HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Kiwi Syslog Server\Parameters\Application". |
References
History
No history.
Status: PUBLISHED
Assigner: SolarWinds
Published:
Updated: 2024-09-16T18:38:19.541Z
Reserved: 2021-06-22T00:00:00.000Z
Link: CVE-2021-35231
No data.
Status : Modified
Published: 2021-10-25T13:15:07.893
Modified: 2024-11-21T06:12:06.697
Link: CVE-2021-35231
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD