SolarWinds.Orion.NPM.API.Script.Endpoint.Remote.Code.Execution
Description
This indicates an attack attempt to exploit a Remote Code Execution Vulnerability in SolarWinds Orion NPM.
The vulnerability is due to insufficient validation of user supplied input. A remote attacker can exploit this vulnerability by uploading a crafted JSON file to vulnerable API of a target system via HTTP. Successful exploitation could lead to arbitrary command execution in the context of the target system.
Affected Products
SolarWinds Orion NPM 2020.2.1 Hotfix 1
SolarWinds Orion NPM 2020.2.1
SolarWinds Orion NPM 2020.2 Hotfix 1
SolarWinds Orion NPM 2020.2
SolarWinds Orion NPM 2019.4 Hotfix 5
SolarWinds Orion NPM 2019.4 Hotfix 4
SolarWinds Orion NPM 2019.4 Hotfix 3
SolarWinds Orion NPM 2019.4 Hotfix 2
SolarWinds Orion NPM 2019.4 Hotfix 1
SolarWinds Orion NPM 2019.4
SolarWinds Orion NPM 2019.2 Hotfix 3
SolarWinds Orion NPM 2019.2 Hotfix 2
SolarWinds Orion NPM 2019.2 Hotfix 1
SolarWinds Orion NPM 2019.2
SolarWinds Orion NPM 2018.4
SolarWinds Orion NPM 2018.2
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://web.archive.org/web/20210119134930/https://www.solarwinds.com/securityadvisory
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |