Two high-severity vulnerabilities patched recently in SolarWinds Platform could lead to command execution and privilege escalation.
The most severe of the two issues is CVE-2022-36963 (CVSS score of 8.8), which is described as a command injection bug in SolarWinds’ infrastructure monitoring and management solution.
The flaw, the company explains, can be exploited remotely to execute arbitrary commands. Successful exploitation of the vulnerability requires that the attacker is in the possession of credentials for a valid SolarWinds Platform admin account.
Tracked as CVE-2022-47505 (CVSS score of 7.8), the second high-severity issue is described as a local privilege escalation flaw.
“This vulnerability allows a local adversary with a valid system user account to escalate local privileges,” SolarWinds explains.
Both issues were reported by Trend Micro Zero Day Initiative researchers and both were addressed with the release of SolarWinds Platform version 2023.2.
The software release also resolves CVE-2022-47509, a medium-severity incorrect input neutralization vulnerability that could be exploited remotely to append URL parameters to inject HTML code. A valid account is required to exploit the issue.
SolarWinds also addressed two medium-severity bugs in Database Performance Analyzer, one leading to sensitive information disclosure and another allowing users to enumerate to different folders of the server.
Database Performance Analyzer version 2023.2 resolves both vulnerabilities.
SolarWinds makes no mention of any of these flaws being exploited in attacks. Additional details on the bugs can be found on the SolarWinds security advisories page.
Related: SolarWinds Announces Upcoming Patches for High-Severity Vulnerabilities
Related: SolarWinds Warns of Attacks Targeting Web Help Desk Users
Related: SolarWinds Patches Serv-U Vulnerability Propagating Log4j Attacks