Vulnerability Description
In SolarWinds Log & Event Manager (LEM) before 6.3.1 Hotfix 4, a menu system is encountered when the SSH service is accessed with "cmc" and "password" (the default username and password). By exploiting a vulnerability in the restrictssh feature of the menuing script, an attacker can escape from the restricted shell.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Solarwinds | Log \& Event Manager | 6.3.1 |
Related Weaknesses (CWE)
References
- https://pentest.blog/unexpected-journey-4-escaping-from-restricted-shell-and-gaiExploitThird Party Advisory
- https://thwack.solarwinds.com/thread/111223MitigationPatchVendor Advisory
- https://pentest.blog/unexpected-journey-4-escaping-from-restricted-shell-and-gaiExploitThird Party Advisory
- https://thwack.solarwinds.com/thread/111223MitigationPatchVendor Advisory
FAQ
What is CVE-2017-7722?
CVE-2017-7722 is a vulnerability with a CVSS score of 10.0 (CRITICAL). In SolarWinds Log & Event Manager (LEM) before 6.3.1 Hotfix 4, a menu system is encountered when the SSH service is accessed with "cmc" and "password" (the default username and password). By exploitin...
How severe is CVE-2017-7722?
CVE-2017-7722 has been rated CRITICAL with a CVSS base score of 10.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-7722?
Check the references section above for vendor advisories and patch information. Affected products include: Solarwinds Log \& Event Manager.