CVE-2021-31217

9.1 CRITICAL

📋 TL;DR

This vulnerability in SolarWinds DameWare Mini Remote Control Server allows attackers with local access to delete files with SYSTEM privileges due to insecure file permissions. It affects organizations using the vulnerable version of this remote administration tool. The high CVSS score reflects the potential for significant system compromise.

💻 Affected Systems

Products:
  • SolarWinds DameWare Mini Remote Control Server
Versions: 12.0.1.200
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the server component of DameWare Mini Remote Control. Requires local access to the system running the vulnerable software.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical system files, leading to denial of service, data loss, or privilege escalation to SYSTEM account.

🟠

Likely Case

Local attackers deleting configuration files, logs, or other sensitive data to disrupt operations or cover tracks.

🟢

If Mitigated

Limited impact if proper access controls and monitoring are in place to detect unauthorized file operations.

🌐 Internet-Facing: LOW (requires local access to exploit)
🏢 Internal Only: HIGH (any local user or compromised account can potentially exploit this vulnerability)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system. The vulnerability involves insecure file permissions that allow file deletion with elevated privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.2 or later

Vendor Advisory: https://documentation.solarwinds.com/en/success_center/dameware/content/release_notes/dameware_12-2_release_notes.htm

Restart Required: Yes

Instructions:

1. Download DameWare Mini Remote Control version 12.2 or later from SolarWinds. 2. Install the update following vendor instructions. 3. Restart the DameWare service or system as required.

🔧 Temporary Workarounds

Restrict Local Access

windows

Limit local access to systems running DameWare Server to authorized administrators only

Monitor File Deletion Events

windows

Enable auditing for file deletion events on DameWare Server directories

auditpol /set /subcategory:"File System" /success:enable /failure:enable

🧯 If You Can't Patch

  • Implement strict access controls to limit who can log into systems running DameWare Server
  • Deploy file integrity monitoring on critical DameWare directories and system files

🔍 How to Verify

Check if Vulnerable:

Check DameWare version in Control Panel > Programs and Features. If version is 12.0.1.200, system is vulnerable.

Check Version:

wmic product where "name like 'DameWare%'" get version

Verify Fix Applied:

Verify installed version is 12.2 or later. Check that file permissions on DameWare directories are properly restricted.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file deletion events in Windows Security logs (Event ID 4663)
  • Failed or successful file deletion attempts in DameWare logs

Network Indicators:

  • Unusual local authentication patterns to DameWare Server systems

SIEM Query:

EventID=4663 AND ObjectName:"*DameWare*" OR ProcessName:"*DameWare*"

🔗 References

📤 Share & Export