An issue was discovered in SolarWinds N-Central 12.3.0.670. The SSH component does not restrict the Communication Channel to Intended Endpoints. An attacker can leverage an SSH feature (port forwarding with a temporary key pair) to access network services on the 127.0.0.1 interface, even though this feature was only intended for user-to-agent communication.
References
Link | Resource |
---|---|
https://ernw.de/en/publications.html | Third Party Advisory |
https://insinuator.net/2020/12/security-advisories-for-solarwinds-n-central/ | Third Party Advisory |
https://support.solarwinds.com/SuccessCenter/s/ | Vendor Advisory |
https://ernw.de/en/publications.html | Third Party Advisory |
https://insinuator.net/2020/12/security-advisories-for-solarwinds-n-central/ | Third Party Advisory |
https://support.solarwinds.com/SuccessCenter/s/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 05:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://ernw.de/en/publications.html - Third Party Advisory | |
References | () https://insinuator.net/2020/12/security-advisories-for-solarwinds-n-central/ - Third Party Advisory | |
References | () https://support.solarwinds.com/SuccessCenter/s/ - Vendor Advisory |
Information
Published : 2020-12-16 14:15
Updated : 2024-11-21 05:18
NVD link : CVE-2020-25619
Mitre link : CVE-2020-25619
CVE.ORG link : CVE-2020-25619
JSON object : View
Products Affected
solarwinds
- n-central
CWE