CVE-2021-35231

MEDIUM

Kiwi Syslog Server - Privilege Escalation

Title source: llm
STIX 2.1

Description

As a result of an unquoted service path vulnerability present in the Kiwi Syslog Server Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry. Example vulnerable path: "Computer\HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Kiwi Syslog Server\Parameters\Application".

Scores

CVSS v3 6.7
EPSS 0.0037
EPSS Percentile 58.9%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-428
Status published
Products (1)
solarwinds/kiwi_syslog_server < 9.8
Published Oct 25, 2021
Tracked Since Feb 18, 2026