CVE-2021-35234

8.0 HIGH

📋 TL;DR

This vulnerability in SolarWinds Orion Core allows authenticated low-privilege users to perform SQL injection attacks through exposed dangerous functions. Attackers can steal password hashes and salt information, potentially leading to privilege escalation. Organizations running vulnerable versions of SolarWinds Orion Platform are affected.

💻 Affected Systems

Products:
  • SolarWinds Orion Platform
Versions: 2020.2.6 and earlier versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access, but even low-privilege users can exploit this vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Orion Platform with administrative access, credential theft across the environment, and lateral movement to connected systems.

🟠

Likely Case

Privilege escalation from low-privilege user to administrator, theft of password hashes for offline cracking, and potential access to sensitive configuration data.

🟢

If Mitigated

Limited to authenticated users only, with proper network segmentation preventing lateral movement and strong password policies reducing hash cracking effectiveness.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once credentials are obtained. Multiple proof-of-concept examples exist in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2020.2.6 Hotfix 3 or later

Vendor Advisory: https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35234

Restart Required: Yes

Instructions:

1. Download Hotfix 3 from SolarWinds Success Center. 2. Stop Orion services. 3. Apply the hotfix. 4. Restart Orion services. 5. Verify the patch is applied by checking version.

🔧 Temporary Workarounds

Restrict User Privileges

all

Minimize the number of users with access to Orion Platform and apply principle of least privilege.

Network Segmentation

all

Isolate Orion Platform from internet and restrict access to trusted networks only.

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the Orion Platform
  • Enable detailed logging and monitoring for SQL injection attempts and unusual authentication patterns

🔍 How to Verify

Check if Vulnerable:

Check Orion Platform version in web interface or via 'About' in Orion Web Console. Versions 2020.2.6 and earlier are vulnerable.

Check Version:

In Orion Web Console, navigate to Settings → About Orion to view version information.

Verify Fix Applied:

Verify version is 2020.2.6 Hotfix 3 or later. Check patch installation logs for successful application of Hotfix 3.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries from authenticated users
  • Multiple failed authentication attempts followed by successful login
  • Access to password hash tables from non-admin accounts

Network Indicators:

  • SQL injection patterns in HTTP requests to Orion endpoints
  • Unusual outbound connections from Orion server

SIEM Query:

source="orion_logs" AND (event_type="sql_query" AND query CONTAINS "password_hash" OR query CONTAINS "password_salt")

🔗 References

📤 Share & Export