CVE-2023-40055

8.0 HIGH

📋 TL;DR

This vulnerability allows low-privileged users to exploit directory traversal in SolarWinds Network Configuration Manager to execute arbitrary code with SYSTEM privileges. It affects organizations using vulnerable versions of SolarWinds Network Configuration Manager. This issue was previously reported as CVE-2023-33227 but was not properly resolved.

💻 Affected Systems

Products:
  • SolarWinds Network Configuration Manager
Versions: Specific versions not detailed in advisory; check SolarWinds advisory for exact affected versions
Operating Systems: Windows (typically)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects installations where low-privileged users have access to the vulnerable component. Previous patch for CVE-2023-33227 was insufficient.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary code as SYSTEM, install malware, steal credentials, and pivot to other systems.

🟠

Likely Case

Attackers gain SYSTEM privileges on the affected server, enabling data theft, lateral movement, and persistence establishment.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege, and monitoring are in place, though SYSTEM access remains dangerous.

🌐 Internet-Facing: HIGH if exposed to internet, as it enables remote code execution with high privileges.
🏢 Internal Only: HIGH even internally, as low-privileged users can escalate to SYSTEM and compromise the server.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires low-level user access but leads to SYSTEM privileges. Directory traversal vulnerabilities are often straightforward to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SolarWinds advisory for specific patched version

Vendor Advisory: https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-40055

Restart Required: Yes

Instructions:

1. Review SolarWinds advisory for affected versions. 2. Download and apply the latest patch from SolarWinds. 3. Restart the Network Configuration Manager service. 4. Verify the patch is applied successfully.

🔧 Temporary Workarounds

Restrict User Access

all

Limit access to Network Configuration Manager to only necessary administrative users.

Network Segmentation

all

Isolate the Network Configuration Manager server from critical systems and limit inbound connections.

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the vulnerable service.
  • Monitor for suspicious activity and file changes on the affected server, especially from low-privileged users.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of SolarWinds Network Configuration Manager against the patched version in the SolarWinds advisory.

Check Version:

Check within the SolarWinds Network Configuration Manager interface or consult SolarWinds documentation for version checking.

Verify Fix Applied:

Confirm the patch version is installed and test that directory traversal attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns, especially directory traversal sequences (e.g., '../') in logs
  • Unexpected process execution from the Network Configuration Manager service

Network Indicators:

  • Suspicious inbound connections to Network Configuration Manager ports from unauthorized sources

SIEM Query:

Example: search for events from SolarWinds Network Configuration Manager with file paths containing '../' or unusual command execution.

🔗 References

📤 Share & Export