Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-35231


As a result of an unquoted service path vulnerability present in the Kiwi Syslog Server Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry. Example vulnerable path: "Computer\HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Kiwi Syslog Server\Parameters\Application".


Published

2021-10-25T13:15:07.893

Last Modified

2024-11-21T06:12:06.697

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.7 (MEDIUM)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

3.9

Impact Score

6.4

Weaknesses
  • Type: Secondary
    CWE-428
  • Type: Primary
    CWE-428

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application solarwinds kiwi_syslog_server < 9.8 Yes

References