Executive Summary
Summary | |
---|---|
Title | SolarWinds Orion API authentication bypass allows remote command execution |
Informations | |||
---|---|---|---|
Name | VU#843464 | First vendor Publication | 2020-12-26 |
Vendor | VU-CERT | Last vendor Modification | 2021-01-28 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 9.8 | ||
Base Score | 9.8 | Environmental Score | 9.8 |
impact SubScore | 5.9 | Temporal Score | 9.8 |
Exploitabality Sub Score | 3.9 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | None | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
OverviewThe SolarWinds Orion API is vulnerable to authentication bypass that could allow a remote attacker to execute API commands. DescriptionThe SolarWinds Orion Platform is a suite of infrastructure and system monitoring and management products. The SolarWinds Orion API is embedded into the Orion Core and is used to interface with all SolarWinds Orion Platform products. API authentication can be bypassed by including specific parameters in the This vulnerability, also known as CVE-2020-10148, is the vulnerability that SolarWinds has indicated to have been used to install the malware known as SUPERNOVA. We have created a python3 script to check for vulnerable SolarWinds Orion servers: swcheck.py ImpactThis vulnerability could allow a remote attacker to bypass authentication and execute API commands which may result in a compromise of the SolarWinds instance. SolutionApply an Update Users should update to the relevant versions of the SolarWinds Orion Platform:
More information can be found in the SolarWinds Security Advisory. Harden the IIS Server Especially in cases when updates cannot be installed, we recommend that users implement these mitigations to harden the IIS server. AcknowledgementsThis document was written by Madison Oliver and Will Dormann. |
Original Source
Url : https://kb.cert.org/vuls/id/843464 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-306 | Missing Authentication for Critical Function (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 3 |
Snort® IPS/IDS
Date | Description |
---|---|
2021-02-18 | SolarWinds Orion authentication bypass attempt RuleID : 56917 - Revision : 1 - Type : SERVER-WEBAPP |
2021-02-18 | SolarWinds Orion authentication bypass attempt RuleID : 56916 - Revision : 1 - Type : SERVER-WEBAPP |
2021-02-02 | SolarWinds Orion authentication bypass attempt RuleID : 56829 - Revision : 1 - Type : SERVER-WEBAPP |
2021-02-02 | SolarWinds Orion authentication bypass attempt RuleID : 56828 - Revision : 2 - Type : SERVER-WEBAPP |
2021-02-02 | SolarWinds Orion authentication bypass attempt RuleID : 56827 - Revision : 2 - Type : SERVER-WEBAPP |
2021-02-02 | SolarWinds Orion authentication bypass attempt RuleID : 56826 - Revision : 2 - Type : SERVER-WEBAPP |
2021-02-02 | SolarWinds Orion version lookup attempt RuleID : 56825 - Revision : 1 - Type : POLICY-OTHER |
Alert History
Date | Informations |
---|---|
2021-01-28 21:17:59 |
|
2021-01-15 00:17:32 |
|
2021-01-12 21:18:02 |
|
2021-01-12 00:17:35 |
|
2020-12-31 21:29:47 |
|
2020-12-29 21:17:59 |
|
2020-12-27 05:17:35 |
|
2020-12-26 21:17:58 |
|