A flaw was found in the REST API. An improperly handled REST API call could allow any logged user to elevate privileges up to the system account. This affects StarWind Command Center build 6003 v2.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.starwindsoftware.com/security/sw-20220121-0001/ |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T03:51:46.130Z
Reserved: 2022-01-24T00:00:00
Link: CVE-2022-23858

No data.

Status : Modified
Published: 2022-01-24T03:15:09.517
Modified: 2024-11-21T06:49:22.617
Link: CVE-2022-23858

No data.