Submit a ticketCall us

Solarwinds & Cisco Live! Barcelona
Join us from the 29th of January to the 2nd of February at Cisco Live 2018 in Barcelona, where we will continue to show how monitoring the network with SolarWinds will keep you ahead of the game. At our booth (WEP 1A), we will demonstrate how SolarWinds network solutions can help. As a bonus, we are also hosting a pre-event webinar - Blame the Network, Hybrid IT Edition with our SolarWinds Head Geek™, Patrick Hubbard on January 24th - GMT (UTC+0): 10:00 a.m. to 11:00 a.m. There's still time to RSVP.

Home > Success Center > Archive > 2017December13 - Deletes > Privilege Vulnerability detected in SAM

Privilege Vulnerability detected in SAM

Table of contents

Updated July 28, 2016


This article explains why Zero Day Initiative detects a vulnerability in the Orion Alert Manager that allows it to execute scripts or programs. The Vulnerability ID is ZDI-14-428. More information in Zero Day Initiative (© 2016 Zero Day Initiative, available at, obtained on July 27, 2016.)


All SAM versions


This is by design and will not be changed. The purpose of the Alerting Service is to run actions configured by the user to run executables, run scripts, restart services, reboot servers, send emails, and so on.  Without the privilege of performing these actions, the Alerting Service cannot attempt to recover items that are currently in a failed state and cannot notify you of these failed states.



Last modified