SB2021020326 - Multiple vulnerabilities in SolarWinds Orion Platform 



SB2021020326 - Multiple vulnerabilities in SolarWinds Orion Platform

Published: February 3, 2021

Security Bulletin ID SB2021020326
Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 33% Medium 33% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Improper access control (CVE-ID: N/A)

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote authenticated user can bypass implemented security restrictions and gain unauthorized access to the application.


2) Deserialization of Untrusted Data (CVE-ID: CVE-2021-25274)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to insecure input validation when processing serialized data within the SolarWinds Collector Service MSMQ. A remote non-authenticated attacker can send specially crafted messages to the application and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


3) Incorrect default permissions (CVE-ID: CVE-2021-25275)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to incorrect default permissions for SQL database files. A local user with access to the system can view contents of files and obtain login credentials for all application users.


Remediation

Install update from vendor's website.