First published: Mon Dec 20 2021(Updated: )
Numerous exposed dangerous functions within Orion Core has allows for read-only SQL injection leading to privileged escalation. An attacker with low-user privileges may steal password hashes and password salt information.
Credit: psirt@solarwinds.com psirt@solarwinds.com
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds Orion Platform | <=2020.2.5 | |
SolarWinds Orion Platform | =2020.2.6 | |
SolarWinds Orion Platform | =2020.2.6-hotfix1 | |
SolarWinds Orion Platform | =2020.2.6-hotfix2 | |
The SolarWinds Development Team has created a fix for this vulnerability by revoking permission to non-admin users when running SQL Queries. SolarWinds advises its customers to upgrade to the latest version (2020.2.6 HF3) once it becomes generally available.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-35234 is a vulnerability that allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor.
The severity of CVE-2021-35234 is high, with a severity value of 8.8.
Authentication is required to exploit CVE-2021-35234.
To fix CVE-2021-35234, update to the recommended versions provided by SolarWinds and apply the necessary hotfixes.
You can find more information about CVE-2021-35234 in the references provided by SolarWinds.