Submit a ticketCall us

Have You Auto Renewed? If not, you're missing out.
The SolarWinds Renewal Program comes with a host of benefits including the most recent product updates, 24/7 technical support, virtual instructor-led training and more. Experience all of this with the convenience of Auto Renewal, and never worry about missing any of these great benefits. Learn More.

Home > Success Center > Archive > 2018Jan2 - Deletes > Remote Code Execution Vulnerability detected in Pepco32c.ocx

Remote Code Execution Vulnerability detected in Pepco32c.ocx

Created by Chris Foley, last modified by Kevin.Swinson on Jan 02, 2018

Views: 776 Votes: 0 Revisions: 5

Overview

This article discusses the SAM Pepco32c.ocx Remote Code Execution vulnerability and describes how to address this vulnerability.

Environment

  • SAM 6.0
  • NPM 10.6

Cause 

Pepco32c.ocx is a third-party application previously used to build pie charts within Orion. The vulnerability exists due to insufficient bound checks on user-supplied input by the affected software. An attacker could exploit this vulnerability to execute arbitrary code in the context of the application using the ActiveX control Pepco32c.ocx. An exploit could allow an attacker to execute arbitrary code or cause a denial of service (DoS) condition.

Resolution

The security vulnerability is known to be fixed in the following applications versions as the third-party application is longer used:

  • NPM 10.6.1
  • SAM 6.0.2

To fix the issue, upgrade to these versions or higher.

Note: If you are already running version higher than these versions, delete the following file as it is no longer required:

C:\Program Files\Common Files\SolarWinds\Pepco32c.ocx

 

 

Last modified

Tags

Classifications

Public