There is no information about possible countermeasures known. The attack technique deployed by this issue is T1222 according to MITRE ATT&CK. The pricing for an exploit might be around USD $0-$5k at the moment ( estimation calculated on ). The technical details are unknown and an exploit is not publicly available. The requirement for exploitation is a simple authentication. The identification of this vulnerability is CVE-2021-31217 since. In SolarWinds DameWare Mini Remote Control Server 12.0.1.200, insecure file permissions allow file deletion as SYSTEM. Using CWE to declare the problem leads to CWE-275. The manipulation with an unknown input leads to a privilege escalation vulnerability. This issue affects an unknown code block. ![]() A high score indicates an elevated risk to be targeted for this vulnerability.Ī vulnerability was found in SolarWinds DameWare Mini Remote Control 12.0.1.200 ( Remote Access Software). The CTI Interest Score identifies the interest of attackers and the security community for this specific vulnerability in real-time. Our Cyber Threat Intelligence team is monitoring different web sites, mailing lists, exploit markets and social media networks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |