CVE-2020-25619
low-risk
Published 2020-12-16
An issue was discovered in SolarWinds N-Central 12.3.0.670. The SSH component does not restrict the Communication Channel to Intended Endpoints. An attacker can leverage an SSH feature (port forwarding with a temporary key pair) to access network services on the 127.0.0.1 interface, even though this feature was only intended for user-to-agent communication.
Do I need to act?
-
0.80% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.4/10
Medium
LOCAL
/ LOW complexity
Affected Products (1)
N-Central
Affected Vendors
References (6)
Third Party Advisory
https://ernw.de/en/publications.html
Third Party Advisory
https://insinuator.net/2020/12/security-advisories-for-solarwinds-n-central/
Vendor Advisory
https://support.solarwinds.com/SuccessCenter/s/
Third Party Advisory
https://ernw.de/en/publications.html
Third Party Advisory
https://insinuator.net/2020/12/security-advisories-for-solarwinds-n-central/
Vendor Advisory
https://support.solarwinds.com/SuccessCenter/s/
23
/ 100
low-risk
Severity
15/34 · Moderate
Exploitability
3/34 · Minimal
Exposure
5/34 · Minimal