{
    "file_item": {
        "filepath": "security-advisories",
        "filename": "CERT-EU-SA2022-082.pdf"
    },
    "title": "Multiple Vulnerabilities in SolarWinds Platform",
    "serial_number": "2022-082",
    "publish_date": "01-12-2022 16:50:00",
    "description": "On November 22, SolarWinds released a patch note for SolarWinds Platform 2022.4 fixing 7 vulnerabilities including 4 high rated vulnerabilities that could lead to arbitrary commands executed.",
    "url_title": "2022-082",
    "content_markdown": "---\ntitle: 'Multiple Vulnerabilities in\u00a0SolarWinds\u00a0Platform' \nversion: '1.0' \nnumber: '2022-082'\noriginal_date: 'November 22, 2022'\ndate: 'December 1, 2022'\n---\n\n_History:_\n\n* _01/12/2022 --- v1.0 -- Initial publication_\n\n# Summary\n\nOn November 22, SolarWinds released a patch note for SolarWinds Platform 2022.4 fixing 7 vulnerabilities including 4 high rated vulnerabilities that could lead to arbitrary commands executed [1].\n\n# Technical Details\n\nThere are 7 vulnerabilities fixed in SolarWinds Platform 2022.4 [1]:\n\n- **CVE-2022-36957** - (CVSS 7.2 High) - This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands on the Main Poller of affected versions of the SolarWinds Platform;\n- **CVE-2022-36958** - (CVSS 8.8 High) - Deserialisation of Untrusted Data \tThis vulnerability allows a remote adversary with valid access to SolarWinds Web Console to execute arbitrary commands on the Main Poller of affected versions of the SolarWinds Platform;\n- **CVE-2022-36960** - (CVSS 8.8 High) - This vulnerability allows a remote adversary with valid access to SolarWinds Web Console to escalate user privileges on affected versions of the SolarWinds Platform;\n- **CVE-2022-36962** - (CVSS 7.2 High) - This vulnerability allows a remote adversary with complete control over the SolarWinds database to execute arbitrary commands on the Main Poller of affected versions of the SolarWinds Platform;\n- **CVE-2022-36964** - (CVSS 8.8 High) - This vulnerability allows a remote adversary with valid access to SolarWinds Web Console to execute arbitrary commands on the Main Poller of affected versions of the SolarWinds Platform;\n- **CVE-2022-36966** - (CVSS 5.9 Medium) - Users with Node Management rights were able to view and edit all nodes due to Insufficient control on URL parameter causing insecure direct object reference (IDOR) vulnerability in SolarWinds Platform 2022.3;\n- **CVE-2022-38108** - (CVSS 7.2 High) - This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands on the Main Poller of affected versions of the SolarWinds Platform.\n\n\n# Affected Products\n\nThe following products are affected [1]:\n\n- SolarWinds Platform 2022.3 and earlier;\n- Orion Platform 2020.2.6 HF5 and earlier.\n\n# Recommendations\n\nCERT-EU recommends to upgrade to SolarWinds Platform 2022.4 [2].\n\n# References\n\n[1] <https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2022-4_release_notes.htm>  \n\n[2] <https://www.solarwinds.com/trust-center/security-advisories/cve-2022-36962>\n\n\n",
    "content_html": "<p><em>History:</em></p><ul><li><em>01/12/2022 --- v1.0 -- Initial publication</em></li></ul><h2 id=\"summary\">Summary</h2><p>On November 22, SolarWinds released a patch note for SolarWinds Platform 2022.4 fixing 7 vulnerabilities including 4 high rated vulnerabilities that could lead to arbitrary commands executed [1].</p><h2 id=\"technical-details\">Technical Details</h2><p>There are 7 vulnerabilities fixed in SolarWinds Platform 2022.4 [1]:</p><ul><li><strong>CVE-2022-36957</strong> - (CVSS 7.2 High) - This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands on the Main Poller of affected versions of the SolarWinds Platform;</li><li><strong>CVE-2022-36958</strong> - (CVSS 8.8 High) - Deserialisation of Untrusted Data This vulnerability allows a remote adversary with valid access to SolarWinds Web Console to execute arbitrary commands on the Main Poller of affected versions of the SolarWinds Platform;</li><li><strong>CVE-2022-36960</strong> - (CVSS 8.8 High) - This vulnerability allows a remote adversary with valid access to SolarWinds Web Console to escalate user privileges on affected versions of the SolarWinds Platform;</li><li><strong>CVE-2022-36962</strong> - (CVSS 7.2 High) - This vulnerability allows a remote adversary with complete control over the SolarWinds database to execute arbitrary commands on the Main Poller of affected versions of the SolarWinds Platform;</li><li><strong>CVE-2022-36964</strong> - (CVSS 8.8 High) - This vulnerability allows a remote adversary with valid access to SolarWinds Web Console to execute arbitrary commands on the Main Poller of affected versions of the SolarWinds Platform;</li><li><strong>CVE-2022-36966</strong> - (CVSS 5.9 Medium) - Users with Node Management rights were able to view and edit all nodes due to Insufficient control on URL parameter causing insecure direct object reference (IDOR) vulnerability in SolarWinds Platform 2022.3;</li><li><strong>CVE-2022-38108</strong> - (CVSS 7.2 High) - This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands on the Main Poller of affected versions of the SolarWinds Platform.</li></ul><h2 id=\"affected-products\">Affected Products</h2><p>The following products are affected [1]:</p><ul><li>SolarWinds Platform 2022.3 and earlier;</li><li>Orion Platform 2020.2.6 HF5 and earlier.</li></ul><h2 id=\"recommendations\">Recommendations</h2><p>CERT-EU recommends to upgrade to SolarWinds Platform 2022.4 [2].</p><h2 id=\"references\">References</h2><p>[1] <a rel=\"noopener\" target=\"_blank\" href=\"https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2022-4_release_notes.htm\">https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2022-4_release_notes.htm</a> </p><p>[2] <a rel=\"noopener\" target=\"_blank\" href=\"https://www.solarwinds.com/trust-center/security-advisories/cve-2022-36962\">https://www.solarwinds.com/trust-center/security-advisories/cve-2022-36962</a></p>",
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}