CVE-2021-35246
Summary
| CVE | CVE-2021-35246 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-11-23 17:15:00 UTC |
| Updated | 2023-08-03 21:15:00 UTC |
| Description | The application fails to prevent users from connecting to it over unencrypted connections. An attacker able to modify a legitimate user's network traffic could bypass the application's use of SSL/TLS encryption and use the application as a platform for attacks against its users. |
Risk And Classification
Problem Types: CWE-319
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Solarwinds | Engineers Toolset | 2020.2.6 | hotfix_4 | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Engineer's Toolset 2022.4 Release Notes | MISC | documentation.solarwinds.com | |
| CVE - CVE-2021-35246 | MISC | cve.mitre.org | |
| SolarWinds Trust Center Security Advisories | CVE-2021-35246 | MISC | www.solarwinds.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.