HIGH · 7.5

CVE-2022-47508

Customers who had configured their polling to occur via Kerberos did not expect NTLM Traffic on their environment, but since we were querying for data via IP address this prevented us from utilizing K...

Vulnerability Description

Customers who had configured their polling to occur via Kerberos did not expect NTLM Traffic on their environment, but since we were querying for data via IP address this prevented us from utilizing Kerberos.

CVSS Score

7.5

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
SolarwindsServer And Application Monitor2022.4

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-47508?

CVE-2022-47508 is a vulnerability with a CVSS score of 7.5 (HIGH). Customers who had configured their polling to occur via Kerberos did not expect NTLM Traffic on their environment, but since we were querying for data via IP address this prevented us from utilizing K...

How severe is CVE-2022-47508?

CVE-2022-47508 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2022-47508?

Check the references section above for vendor advisories and patch information. Affected products include: Solarwinds Server And Application Monitor.