Show filters
291 Total Results
Displaying 1-10 of 291
Sort by:
Attacker Value
Very High
CVE-2020-10148 SolarWinds Orion API authentication bypass and RCE
Disclosure Date: December 29, 2020 (last updated August 02, 2024)
The SolarWinds Orion API is vulnerable to an authentication bypass that could allow a remote attacker to execute API commands. This vulnerability could allow a remote attacker to bypass authentication and execute API commands which may result in a compromise of the SolarWinds instance. SolarWinds Orion Platform versions 2019.4 HF 5, 2020.2 with no hotfix installed, and 2020.2 HF 1 are affected.
17
Attacker Value
Very High
CVE-2024-28995
Disclosure Date: June 06, 2024 (last updated July 18, 2024)
SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine.
5
Attacker Value
Very High
CVE-2021-35211
Disclosure Date: July 13, 2021 (last updated November 28, 2024)
Microsoft discovered a remote code execution (RCE) vulnerability in the SolarWinds Serv-U product utilizing a Remote Memory Escape Vulnerability. If exploited, a threat actor may be able to gain privileged access to the machine hosting Serv-U Only. SolarWinds Serv-U Managed File Transfer and Serv-U Secure FTP for Windows before 15.2.3 HF2 are affected by this vulnerability.
3
Attacker Value
Very High
SolarWinds Orion Platform Unauthenticated RCE (CVE-2021-25274)
Disclosure Date: February 03, 2021 (last updated November 28, 2024)
The Collector Service in SolarWinds Orion Platform before 2020.2.4 uses MSMQ (Microsoft Message Queue) and doesn't set permissions on its private queues. As a result, remote unauthenticated clients can send messages to TCP port 1801 that the Collector Service will process. Additionally, upon processing of such messages, the service deserializes them in insecure manner, allowing remote arbitrary code execution as LocalSystem.
4
Attacker Value
High
CVE-2024-28986
Disclosure Date: August 13, 2024 (last updated August 17, 2024)
SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine.
While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing.
However, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available.
3
Attacker Value
Unknown
CVE-2021-35247
Disclosure Date: January 05, 2022 (last updated October 07, 2023)
Serv-U web login screen to LDAP authentication was allowing characters that were not sufficiently sanitized. SolarWinds has updated the input mechanism to perform additional validation and sanitization. Please Note: No downstream affect has been detected as the LDAP servers ignored improper characters. To insure proper input validation is completed in all environments. SolarWinds recommends scheduling an update to the latest version of Serv-U.
3
Attacker Value
Very High
Serv-U FTP Server prepareinstallation Privilege Escalation
Disclosure Date: June 17, 2019 (last updated November 27, 2024)
A privilege escalation vulnerability exists in SolarWinds Serv-U before 15.1.7 for Linux.
3
Attacker Value
Unknown
CVE-2021-25276
Disclosure Date: February 03, 2021 (last updated November 28, 2024)
In SolarWinds Serv-U before 15.2.2 Hotfix 1, there is a directory containing user profile files (that include users' password hashes) that is world readable and writable. An unprivileged Windows user (having access to the server's filesystem) can add an FTP user by copying a valid profile file to this directory. For example, if this profile sets up a user with a C:\ home directory, then the attacker obtains access to read or replace arbitrary files with LocalSystem privileges.
3
Attacker Value
Moderate
CVE-2024-28987
Disclosure Date: August 21, 2024 (last updated October 17, 2024)
The SolarWinds Web Help Desk (WHD) software is affected by a hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data.
1
Attacker Value
Low
CVE-2022-38108
Disclosure Date: October 19, 2022 (last updated October 08, 2023)
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.
1