Description
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.
Exploits (1)
metasploit
WORKING POC
EXCELLENT
by Justin Hong, Lucas Miller, Piotr Bazydło, Spencer McIntyre · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/misc/solarwinds_amqp_deserialization.rb
References (4)
Core 4
Core References
Various Sources
https://packetstorm.news/files/id/171567
Third Party Advisory, VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-CAN-17531
Exploit, Third Party Advisory
http://packetstormsecurity.com/files/171567/SolarWinds-Information-Service-SWIS-Remote-Command-Execution.html
Scores
CVSS v3
7.2
EPSS
0.8863
EPSS Percentile
99.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-502
Status
published
Products (4)
solarwinds/orion_platform
2020.2.6 (6 CPE variants)
solarwinds/orion_platform
2022.2
solarwinds/orion_platform
2022.3
solarwinds/orion_platform
< 2020.2.6
Published
Oct 20, 2022
Tracked Since
Feb 18, 2026