"SolarWinds Platform Update Patches High-Severity Vulnerabilities"

Two high-severity vulnerabilities that were patched recently in SolarWinds Platform could lead to command execution and privilege escalation.  The most severe of the two issues is CVE-2022-36963 (CVSS score of 8.8), which is described as a command injection bug in SolarWinds’ infrastructure monitoring and management solution.  According to Trend Micro Zero Day Initiative researchers, the flaw can be exploited remotely to execute arbitrary commands.  Successful exploitation of the vulnerability requires that the attacker is in the possession of credentials for a valid SolarWinds Platform admin account.  Tracked as CVE-2022-47505 (CVSS score of 7.8), the second high-severity issue is described as a local privilege escalation flaw.  The researchers stated that this vulnerability allows a local adversary with a valid system user account to escalate local privileges.  The issues were addressed with the release of SolarWinds Platform version 2023.2.  The software release also resolves CVE-2022-47509, a medium-severity incorrect input neutralization vulnerability that could be exploited remotely to append URL parameters to inject HTML code.  A valid account is required to exploit the issue.  SolarWinds also addressed two medium-severity bugs in Database Performance Analyzer, one leading to sensitive information disclosure and another allowing users to enumerate to different folders of the server.  Database Performance Analyzer version 2023.2 resolves both vulnerabilities.  SolarWinds did not mention if any of these flaws are being exploited in attacks. 

 

SecurityWeek reports: "SolarWinds Platform Update Patches High-Severity Vulnerabilities"

Submitted by Anonymous on