CVE-2022-36963

7.2 HIGH

📋 TL;DR

This command injection vulnerability in SolarWinds Platform allows authenticated administrators to execute arbitrary system commands. Attackers with compromised admin credentials can gain full control of affected systems. Organizations using vulnerable SolarWinds Platform versions are at risk.

💻 Affected Systems

Products:
  • SolarWinds Platform
Versions: Versions prior to 2023.2
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin-level authentication to exploit. All SolarWinds Platform deployments with vulnerable versions are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to data theft, ransomware deployment, lateral movement across network, and persistent backdoor installation.

🟠

Likely Case

Privilege escalation leading to unauthorized access to sensitive monitoring data, system configuration changes, and potential credential harvesting.

🟢

If Mitigated

Limited impact due to strong access controls, network segmentation, and admin account monitoring preventing successful exploitation.

🌐 Internet-Facing: HIGH if SolarWinds Platform is exposed to internet with admin accounts accessible.
🏢 Internal Only: HIGH due to potential for lateral movement and admin credential compromise within network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid admin credentials but command injection is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: SolarWinds Platform 2023.2 or later

Vendor Advisory: https://www.solarwinds.com/trust-center/security-advisories/cve-2022-36963

Restart Required: Yes

Instructions:

1. Download SolarWinds Platform 2023.2 or later from SolarWinds Customer Portal. 2. Backup current configuration and database. 3. Run installer with administrative privileges. 4. Restart SolarWinds services after installation completes.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit administrative access to SolarWinds Platform to only essential personnel using principle of least privilege.

Network Segmentation

all

Isolate SolarWinds Platform servers in separate network segment with strict firewall rules.

🧯 If You Can't Patch

  • Implement multi-factor authentication for all SolarWinds admin accounts
  • Monitor and alert on unusual admin account activity and command execution patterns

🔍 How to Verify

Check if Vulnerable:

Check SolarWinds Platform version in web interface under Settings > All Settings > Product Information

Check Version:

Not applicable - use web interface or check installed programs in Windows

Verify Fix Applied:

Verify version is 2023.2 or later and check for successful installation in SolarWinds logs

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in SolarWinds logs
  • Multiple failed admin login attempts followed by successful login
  • Unexpected process creation from SolarWinds services

Network Indicators:

  • Outbound connections from SolarWinds server to unusual destinations
  • Unexpected protocol usage from SolarWinds server

SIEM Query:

source="solarwinds" AND (event_type="command_execution" OR user="admin" AND action="login") | stats count by src_ip, user, command

🔗 References

📤 Share & Export