CVE-2022-47503

7.2 HIGH

📋 TL;DR

This vulnerability in SolarWinds Platform allows remote attackers with Orion admin-level account access to execute arbitrary commands through deserialization of untrusted data. It affects SolarWinds Web Console users with administrative privileges. The vulnerability enables remote code execution on affected systems.

💻 Affected Systems

Products:
  • SolarWinds Platform
Versions: Versions prior to 2023.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Orion admin-level account access to exploit. Affects SolarWinds Web Console installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to execute arbitrary commands, steal sensitive data, deploy ransomware, or establish persistent backdoors.

🟠

Likely Case

Privilege escalation leading to lateral movement within the network, data exfiltration, and installation of additional malware.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access, and monitoring are in place, potentially containing the attack to isolated segments.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials but is straightforward once credentials are obtained. Deserialization vulnerabilities are commonly weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2023.1 or later

Vendor Advisory: https://www.solarwinds.com/trust-center/security-advisories/CVE-2022-47503

Restart Required: Yes

Instructions:

1. Download SolarWinds Platform 2023.1 or later from SolarWinds customer portal. 2. Backup current configuration and database. 3. Run the installer with administrative privileges. 4. Follow upgrade wizard instructions. 5. Restart services as prompted.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit Orion admin-level accounts to only necessary personnel and implement multi-factor authentication.

Network Segmentation

all

Isolate SolarWinds Web Console from critical systems and implement strict firewall rules.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SolarWinds systems from critical infrastructure
  • Enforce multi-factor authentication for all admin accounts and monitor for suspicious login attempts

🔍 How to Verify

Check if Vulnerable:

Check SolarWinds Platform version in Web Console under Settings > All Settings > Product Information. If version is below 2023.1, system is vulnerable.

Check Version:

In SolarWinds Web Console: Settings > All Settings > Product Information

Verify Fix Applied:

Verify version is 2023.1 or later in Product Information. Test admin functionality to ensure no disruption.

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin account activity
  • Deserialization errors in application logs
  • Unexpected process creation from SolarWinds services

Network Indicators:

  • Unusual outbound connections from SolarWinds servers
  • Suspicious PowerShell or command execution patterns

SIEM Query:

source="solarwinds" AND (event_type="deserialization" OR process_name="powershell.exe" OR cmdline="*Invoke-Expression*")

🔗 References

📤 Share & Export