CVE-2022-47506

7.8 HIGH

📋 TL;DR

CVE-2022-47506 is a directory traversal vulnerability in SolarWinds Platform that allows authenticated local attackers to modify default configurations and execute arbitrary commands. This affects organizations using vulnerable SolarWinds Platform versions. Attackers need authenticated access to exploit this vulnerability.

💻 Affected Systems

Products:
  • SolarWinds Platform
Versions: Versions prior to 2023.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local authenticated access; affects default SolarWinds Platform installations

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through arbitrary command execution leading to data theft, lateral movement, or ransomware deployment

🟠

Likely Case

Privilege escalation and unauthorized configuration changes allowing persistence and further exploitation

🟢

If Mitigated

Limited impact due to strong authentication controls and network segmentation restricting attacker movement

🌐 Internet-Facing: MEDIUM - Requires authenticated access but internet-facing instances increase attack surface
🏢 Internal Only: HIGH - Internal attackers with legitimate credentials can exploit this for significant impact

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but directory traversal to command execution is straightforward

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: SolarWinds Platform 2023.1 or later

Vendor Advisory: https://www.solarwinds.com/trust-center/security-advisories/CVE-2022-47506

Restart Required: Yes

Instructions:

1. Download SolarWinds Platform 2023.1 or later from SolarWinds customer portal. 2. Backup current configuration. 3. Run installer with administrative privileges. 4. Restart SolarWinds services after installation.

🔧 Temporary Workarounds

Restrict User Access

all

Limit authenticated user access to only necessary personnel and implement least privilege principles

Network Segmentation

all

Isolate SolarWinds Platform from critical systems and implement strict network access controls

🧯 If You Can't Patch

  • Implement strict access controls and multi-factor authentication for all SolarWinds accounts
  • Monitor and audit configuration changes and command execution activities on SolarWinds systems

🔍 How to Verify

Check if Vulnerable:

Check SolarWinds Platform version in web interface under Settings > All Settings > Product Information

Check Version:

In SolarWinds web interface: Settings > All Settings > Product Information

Verify Fix Applied:

Verify version is 2023.1 or later and check vendor advisory for specific patch verification steps

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized configuration file modifications
  • Unusual command execution patterns in SolarWinds logs
  • Directory traversal attempts in web server logs

Network Indicators:

  • Unexpected outbound connections from SolarWinds servers
  • Anomalous authentication patterns to SolarWinds

SIEM Query:

source="solarwinds" AND (event_type="config_change" OR event_type="command_exec") | stats count by user, src_ip

🔗 References

📤 Share & Export