Vulnerability Details : CVE-2017-7722
Public exploit exists!
In SolarWinds Log & Event Manager (LEM) before 6.3.1 Hotfix 4, a menu system is encountered when the SSH service is accessed with "cmc" and "password" (the default username and password). By exploiting a vulnerability in the restrictssh feature of the menuing script, an attacker can escape from the restricted shell.
Products affected by CVE-2017-7722
- cpe:2.3:a:solarwinds:log_\&_event_manager:6.3.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-7722
1.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 85 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2017-7722
-
SolarWinds LEM Default SSH Password Remote Code Execution
Disclosure Date: 2017-03-17First seen: 2020-04-26exploit/linux/ssh/solarwinds_lem_execThis module exploits the default credentials of SolarWinds LEM. A menu system is encountered when the SSH service is accessed with the default username and password which is "cmc" and "password". By exploiting a vulnerability that exist on the menuing script, an attack
CVSS scores for CVE-2017-7722
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST | |
10.0
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
3.9
|
6.0
|
NIST |
CWE ids for CVE-2017-7722
-
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-7722
-
https://thwack.solarwinds.com/thread/111223
LEM v6.3.1 HOT FIX 4 IS NOW AVAILABLE | THWACKMitigation;Patch;Vendor Advisory
-
https://pentest.blog/unexpected-journey-4-escaping-from-restricted-shell-and-gaining-root-access-to-solarwinds-log-event-manager-siem-product/
Unexpected Journey #4 – Escaping from Restricted Shell and Gaining Root Access to SolarWinds Log & Event Manager (SIEM) Product – Pentest BlogExploit;Third Party Advisory
Jump to