CVE-2021-27240
HIGHSolarWinds Patch Manager 2020.2.1 - Privilege Escalation
Title source: llmDescription
This vulnerability allows local attackers to escalate privileges on affected installations of SolarWinds Patch Manager 2020.2.1. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DataGridService WCF service. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of Administrator. Was ZDI-CAN-12009.
Scores
CVSS v3
7.8
EPSS
0.0064
EPSS Percentile
70.2%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-502
Status
published
Affected Products (1)
solarwinds/patch_manager
Timeline
Published
Mar 29, 2021
Tracked Since
Feb 18, 2026