Two high-severity vulnerabilities patched recently in SolarWinds Platform could lead to command execution and privilege escalation.
The most severe of the two issues is CVE-2022-36963 (CVSS score of 8.8), which is described as a command injection bug in SolarWinds’ infrastructure monitoring and management solution.
The flaw, the company explains, can be exploited remotely to execute arbitrary commands. Successful exploitation of the vulnerability requires that the attacker is in the possession of credentials for a valid SolarWinds Platform admin account.
Tracked as CVE-2022-47505 (CVSS score of 7.8), the second high-severity issue is described as a local privilege escalation flaw.
“This vulnerability allows a local adversary with a valid system user account to escalate local privileges,” SolarWinds explains.
Both issues were reported by Trend Micro Zero Day Initiative researchers and both were addressed with the release of SolarWinds Platform version 2023.2.
The software release also resolves CVE-2022-47509, a medium-severity incorrect input neutralization vulnerability that could be exploited remotely to append URL parameters to inject HTML code. A valid account is required to exploit the issue.
SolarWinds also addressed two medium-severity bugs in Database Performance Analyzer, one leading to sensitive information disclosure and another allowing users to enumerate to different folders of the server.
Database Performance Analyzer version 2023.2 resolves both vulnerabilities.
SolarWinds makes no mention of any of these flaws being exploited in attacks. Additional details on the bugs can be found on the SolarWinds security advisories page.
Related: SolarWinds Announces Upcoming Patches for High-Severity Vulnerabilities
Related: SolarWinds Warns of Attacks Targeting Web Help Desk Users
Related: SolarWinds Patches Serv-U Vulnerability Propagating Log4j Attacks

More from Ionut Arghire
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Enzo Biochem Ransomware Attack Exposes Information of 2.5M Individuals
- Google Temporarily Offering $180,000 for Full Chain Chrome Exploit
- Toyota Discloses New Data Breach Involving Vehicle, Customer Information
- Adobe Inviting Researchers to Private Bug Bounty Program
- Critical Vulnerabilities Found in Faronics Education Software
Latest News
- Insider Q&A: Artificial Intelligence and Cybersecurity In Military Tech
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- OpenAI Unveils Million-Dollar Cybersecurity Grant Program
- Galvanick Banks $10 Million for Industrial XDR Technology
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Idaho Hospitals Working to Resume Full Operations After Cyberattack
