According to a document published by the CERT Coordination Center, the SolarWinds Orion API, which is used to interface with all other Orion system monitoring and management systems, allows attackers to run commands without authentication.
In this vulnerability, the authentication process in the API can be circumvented by adding special parameters to the Request.PathInfo section of the URI request. Thus, potential attackers can execute commands given through the API in the system without authentication.
The vulnerability may also have been used in the installation and dissemination of the malicious software called SUPERNOVA, the information of which was previously published by Microsoft.
AFFECTED SYSTEMS
SOLUTION/RECOMMENDATION
It is recommended to upload updates listed in the following.
2019.4 HF 6 (December 14, 2020)
2020.2.1 HF 2 (December 15, 2020)
2019.2 SUPERNOVA Patch (December 23, 2020)
2018.4 SUPERNOVA Patch (December 23, 2020)
2018.2 SUPERNOVA Patch (December 23, 2020)
For users who have already made the 2020.2.1 HF 2 and 2019.4 HF 6 updates, they are informed that both SUNBURST and SUPERNOVA vulnerabilities have been eliminated and no further action is required.
CVE / CWE
CVE-2020-10148
Additional Information
+90 216 504 53 32
Aydınevler Mahallesi,İsmet İnönü Cadddesi,Küçükyalı Ofis Park A Blok,No:20/1 Maltepe İstanbul
+90 312 235 44 51
You can register to our newsletter on the home page to be instantly informed about security vulnerabilities.