Submit a ticketCall us

ebook60.pngHow to be a Cisco® ASA ace

Our eBook, Thou Shalt Not Pass…I Think?! can help you overcome the challenges of monitoring and managing Cisco ASA firewalls. This eBook is a great read if you’ve been frustrated with monitoring firewalls, managing ACL configs, and troubleshooting VPN connections.

Get your free eBook.

Home > Success Center > Archive > 2018Jan2 - Deletes > Remote Code Execution Vulnerability detected in Pepco32c.ocx

Remote Code Execution Vulnerability detected in Pepco32c.ocx

This article is slated for Deletion. Do not update this article. If you have questions please send a message to mt-feedback@solarwinds.com

Created by Chris Foley, last modified by Kevin.Swinson on Jan 02, 2018

Views: 792 Votes: 0 Revisions: 5

Overview

This article discusses the SAM Pepco32c.ocx Remote Code Execution vulnerability and describes how to address this vulnerability.

Environment

  • SAM 6.0
  • NPM 10.6

Cause 

Pepco32c.ocx is a third-party application previously used to build pie charts within Orion. The vulnerability exists due to insufficient bound checks on user-supplied input by the affected software. An attacker could exploit this vulnerability to execute arbitrary code in the context of the application using the ActiveX control Pepco32c.ocx. An exploit could allow an attacker to execute arbitrary code or cause a denial of service (DoS) condition.

Resolution

The security vulnerability is known to be fixed in the following applications versions as the third-party application is longer used:

  • NPM 10.6.1
  • SAM 6.0.2

To fix the issue, upgrade to these versions or higher.

Note: If you are already running version higher than these versions, delete the following file as it is no longer required:

C:\Program Files\Common Files\SolarWinds\Pepco32c.ocx

 

 

Last modified

Tags

Classifications

Public