Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2023-33226
The Network Configuration Manager was susceptible to a Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows a low-level user to perform the actions with SYSTEM privileges.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.036
EPSS Ranking
87.2%
CVSS Severity
CVSS v3 Score
8.0
References
https://documentation.solarwinds.com/en/success_center/ncm/content/release_notes/ncm_2023-4_release_notes.htm
https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-33226
https://documentation.solarwinds.com/en/success_center/ncm/content/release_notes/ncm_2023-4_release_notes.htm
https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-33226
Products affected by CVE-2023-33226
Solarwinds
»
Network Configuration Manager
»
Version:
2020.2.5
cpe:2.3:a:solarwinds:network_configuration_manager:2020.2.5
Solarwinds
»
Network Configuration Manager
»
Version:
7.2.0
cpe:2.3:a:solarwinds:network_configuration_manager:7.2.0
Solarwinds
»
Network Configuration Manager
»
Version:
7.2.1
cpe:2.3:a:solarwinds:network_configuration_manager:7.2.1
Solarwinds
»
Network Configuration Manager
»
Version:
7.2.2
cpe:2.3:a:solarwinds:network_configuration_manager:7.2.2
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved