As a result of an unquoted service path vulnerability present in the Kiwi Syslog Server Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry. Example vulnerable path: "Computer\HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Kiwi Syslog Server\Parameters\Application".
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-21874 | As a result of an unquoted service path vulnerability present in the Kiwi Syslog Server Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry. Example vulnerable path: "Computer\HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Kiwi Syslog Server\Parameters\Application". |
Fixes
Solution
SolarWinds advises Kiwi Syslog Server customers to upgrade to the latest version (9.8) once it becomes generally available.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SolarWinds
Published:
Updated: 2024-09-16T18:38:19.541Z
Reserved: 2021-06-22T00:00:00
Link: CVE-2021-35231
No data.
Status : Modified
Published: 2021-10-25T13:15:07.893
Modified: 2024-11-21T06:12:06.697
Link: CVE-2021-35231
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD