CVE-2022-23858
Summary
| CVE | CVE-2022-23858 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-01-24 03:15:00 UTC |
| Updated | 2022-12-09 16:23:00 UTC |
| Description | A flaw was found in the REST API. An improperly handled REST API call could allow any logged user to elevate privileges up to the system account. This affects StarWind Command Center build 6003 v2. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Starwindsoftware | Command Center | 2 | build_6003 | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| SW-20220121-0001 Command Center Service vulnerability in StarWind products | MISC | www.starwindsoftware.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.