// For flags

CVE-2022-36962

SolarWinds Platform Command Injection

Severity Score

7.2
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

SolarWinds Platform was susceptible to Command Injection. This vulnerability allows a remote adversary with complete control over the SolarWinds database to execute arbitrary commands.

La plataforma SolarWinds era susceptible a la Inyección de Comandos. Esta vulnerabilidad permite que un adversario remoto con control total sobre la base de datos de SolarWinds ejecute comandos arbitrarios.

This vulnerability allows remote attackers to execute code on affected installations of SolarWinds Network Performance Monitor. Authentication is required to exploit this vulnerability.
The specific flaw exists within the GetPdf function. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.

*Credits: SolarWinds would like to thank Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative for reporting on the issue in a responsible manner.
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-07-27 CVE Reserved
  • 2022-11-23 CVE Published
  • 2024-09-17 CVE Updated
  • 2024-11-13 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Solarwinds
Search vendor "Solarwinds"
Orion Platform
Search vendor "Solarwinds" for product "Orion Platform"
< 2020.2.6
Search vendor "Solarwinds" for product "Orion Platform" and version " < 2020.2.6"
-
Affected
Solarwinds
Search vendor "Solarwinds"
Orion Platform
Search vendor "Solarwinds" for product "Orion Platform"
2020.2.6
Search vendor "Solarwinds" for product "Orion Platform" and version "2020.2.6"
-
Affected
Solarwinds
Search vendor "Solarwinds"
Orion Platform
Search vendor "Solarwinds" for product "Orion Platform"
2020.2.6
Search vendor "Solarwinds" for product "Orion Platform" and version "2020.2.6"
hotfix1
Affected
Solarwinds
Search vendor "Solarwinds"
Orion Platform
Search vendor "Solarwinds" for product "Orion Platform"
2020.2.6
Search vendor "Solarwinds" for product "Orion Platform" and version "2020.2.6"
hotfix2
Affected
Solarwinds
Search vendor "Solarwinds"
Orion Platform
Search vendor "Solarwinds" for product "Orion Platform"
2020.2.6
Search vendor "Solarwinds" for product "Orion Platform" and version "2020.2.6"
hotfix3
Affected
Solarwinds
Search vendor "Solarwinds"
Orion Platform
Search vendor "Solarwinds" for product "Orion Platform"
2020.2.6
Search vendor "Solarwinds" for product "Orion Platform" and version "2020.2.6"
hotfix4
Affected
Solarwinds
Search vendor "Solarwinds"
Orion Platform
Search vendor "Solarwinds" for product "Orion Platform"
2020.2.6
Search vendor "Solarwinds" for product "Orion Platform" and version "2020.2.6"
hotfix5
Affected
Solarwinds
Search vendor "Solarwinds"
Orion Platform
Search vendor "Solarwinds" for product "Orion Platform"
2022.2
Search vendor "Solarwinds" for product "Orion Platform" and version "2022.2"
-
Affected
Solarwinds
Search vendor "Solarwinds"
Orion Platform
Search vendor "Solarwinds" for product "Orion Platform"
2022.3
Search vendor "Solarwinds" for product "Orion Platform" and version "2022.3"
-
Affected