QID 376651

Date Published: 2022-06-06

QID 376651: SolarWinds Orion Patch Manager Remote Code Execution (RCE) Vulnerability

SolarWinds Orion Platform is used to monitor, visualize, and analyze the performance of networks, applications, systems, and databases on-premises, in a hybrid environment, or in the cloud.

This vulnerability allows an unauthorized attacker who has network access to the Orion Patch Manager Web Console to potentially exploit this and compromise the server
The specific flaw exists due to deserialization of Untrusted Data in the Web Console Chart Endpoint
The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data.

Affected Versions:
SolarWinds Orion Patch Manager prior to 2020.2.6

QID Detection Logic (Authenticated):
This QID checks for vulnerable version of SolarWinds Orion Patch Manager (PM)

An attacker can lead to remote code execution

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as High - 6.5 severity.
  • Solution
    Customers are advised to upgrade to the version 2020.2.6 PM 2020.2.6 Release Notes

    CVEs related to QID 376651

    Software Advisories
    Advisory ID Software Component Link
    CVE-2021-35218 URL Logo www.solarwinds.com/trust-center/security-advisories/cve-2021-35218