SolarWinds Platform is susceptible to an Uncontrolled Search Path Element Local Privilege Escalation vulnerability. This requires a low privilege account and local access to the affected node machine.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-41560 SolarWinds Platform is susceptible to an Uncontrolled Search Path Element Local Privilege Escalation vulnerability. This requires a low privilege account and local access to the affected node machine.
Fixes

Solution

SolarWinds recommends that customers upgrade to SolarWinds Platform 2024.4 as soon as it becomes available.


Workaround

No workaround given by the vendor.

History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00143}

epss

{'score': 0.00159}


Wed, 16 Oct 2024 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Solarwinds
Solarwinds solarwinds Platform
CPEs cpe:2.3:a:solarwinds:solarwinds_platform:*:*:*:*:*:*:*:*
Vendors & Products Solarwinds
Solarwinds solarwinds Platform
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 16 Oct 2024 07:30:00 +0000

Type Values Removed Values Added
Description SolarWinds Platform is susceptible to an Uncontrolled Search Path Element Local Privilege Escalation vulnerability. This requires a low privilege account and local access to the affected node machine.
Title SolarWinds Platform Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
Weaknesses CWE-427
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SolarWinds

Published:

Updated: 2025-03-01T04:55:52.193Z

Reserved: 2024-09-05T08:28:03.887Z

Link: CVE-2024-45710

cve-icon Vulnrichment

Updated: 2024-10-16T13:29:33.676Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-16T08:15:06.387

Modified: 2024-10-17T20:18:04.277

Link: CVE-2024-45710

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.