A vulnerability has been identified within Serv-U 15.4 that, if exploited, allows an actor to bypass multi-factor/two-factor authentication. The actor must have administrator-level access to Serv-U to perform this action.
References
Configurations
History
21 Nov 2024, 08:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://support.solarwinds.com/SuccessCenter/s/article/Serv-U-15-4-Hotfix-1?language=en_US - Release Notes | |
References | () https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-35179 - Broken Link |
17 Aug 2023, 16:27
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-35179 - Broken Link | |
References | (MISC) https://support.solarwinds.com/SuccessCenter/s/article/Serv-U-15-4-Hotfix-1?language=en_US - Release Notes | |
First Time |
Solarwinds serv-u
Solarwinds |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
CPE | cpe:2.3:a:solarwinds:serv-u:15.4.0:-:*:*:*:*:*:* |
11 Aug 2023, 03:44
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-11 00:15
Updated : 2024-11-21 08:08
NVD link : CVE-2023-35179
Mitre link : CVE-2023-35179
CVE.ORG link : CVE-2023-35179
JSON object : View
Products Affected
solarwinds
- serv-u
CWE
CWE-284
Improper Access Control