CVE-2021-35212

8.9 HIGH

📋 TL;DR

CVE-2021-35212 is a blind Boolean SQL injection vulnerability in SolarWinds Orion Platform that allows authenticated users to escalate privileges and gain full read/write access to the Orion database, including sensitive certificates. This affects any organization running vulnerable versions of SolarWinds Orion products. Attackers could compromise the entire Orion infrastructure through this vulnerability.

💻 Affected Systems

Products:
  • SolarWinds Orion Platform
Versions: 2020.2.5 HF 1 and earlier versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all Orion Platform deployments with default configurations. Requires authenticated access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Orion database leading to certificate theft, lateral movement across network, and persistent backdoor access to managed systems.

🟠

Likely Case

Privilege escalation to administrative access, data exfiltration from Orion database, and potential credential harvesting.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access, and monitoring are implemented.

🌐 Internet-Facing: HIGH - Orion platforms often have internet-facing management interfaces, making them prime targets.
🏢 Internal Only: HIGH - Even internally, authenticated users can exploit this to gain administrative privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. ZDI has published technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2020.2.6 or later

Vendor Advisory: https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35212

Restart Required: Yes

Instructions:

1. Download Orion Platform 2020.2.6 or later from SolarWinds Customer Portal. 2. Backup current Orion installation. 3. Run the installer with administrative privileges. 4. Restart Orion services after installation completes.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to Orion Platform to only trusted administrative networks and users.

Principle of Least Privilege

all

Review and minimize user accounts with access to Orion Platform, removing unnecessary privileges.

🧯 If You Can't Patch

  • Implement strict network access controls to limit Orion Platform access to essential personnel only.
  • Enable detailed SQL query logging and monitor for unusual database access patterns.

🔍 How to Verify

Check if Vulnerable:

Check Orion Platform version in web interface under Settings > All Settings > Product Information.

Check Version:

Not applicable - check via Orion web interface or Windows Services for Orion version.

Verify Fix Applied:

Verify version is 2020.2.6 or later and test that SQL injection payloads no longer execute.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in Orion database logs
  • Multiple failed login attempts followed by successful authentication
  • Unexpected privilege escalation events

Network Indicators:

  • Unusual database connection patterns to Orion SQL server
  • HTTP requests containing SQL injection patterns to Orion web interface

SIEM Query:

source="orion_logs" AND ("sql injection" OR "privilege escalation" OR "unusual query")

🔗 References

📤 Share & Export