First published: Wed Sep 01 2021(Updated: )
Insecure Deserialization of untrusted data remote code execution vulnerability was discovered in Patch Manager Orion Platform Integration module. An Authenticated Attacker with network access via HTTP can compromise this vulnerability can result in Remote Code Execution.
Credit: psirt@solarwinds.com
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds Patch Manager | <2020.2.6 | |
SolarWinds recommends upgrading to both the latest version of Patch Manager and Orion Integration Module as soon as it becomes available.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-35216 is a vulnerability in SolarWinds Patch Manager that allows remote attackers to execute arbitrary code.
CVE-2021-35216 has a severity rating of critical.
CVE-2021-35216 affects SolarWinds Patch Manager 2020.2.6 and earlier versions.
Yes, authentication is required to exploit CVE-2021-35216.
To fix CVE-2021-35216, apply the necessary patches and updates provided by SolarWinds.