CVE-2020-10148
SolarWinds Platform vulnerability analysis and mitigation

Overview

The SolarWinds Orion API contains an authentication bypass vulnerability (CVE-2020-10148) that could allow remote attackers to execute API commands without authentication. The vulnerability affects SolarWinds Orion Platform versions 2019.4 HF 5, 2020.2 with no hotfix installed, and 2020.2 HF 1. This vulnerability was publicly disclosed on December 26, 2020 (CERT VU, NVD).

Technical details

The vulnerability exists in the SolarWinds Orion API authentication mechanism. An attacker can bypass authentication by including specific parameters in the Request.PathInfo portion of a URI request. Specifically, if an attacker appends PathInfo parameters like WebResource.axd, ScriptResource.axd, i18n.ashx, or Skipi18n to a request, the system may set the SkipAuthorization flag, allowing API requests to be processed without authentication (CERT VU). The vulnerability has been assigned a CVSS v3.1 base score of 9.8 Critical (AttackerKB).

Impact

This vulnerability could allow remote attackers to bypass authentication and execute API commands, potentially resulting in a complete compromise of the SolarWinds instance. The vulnerability has been linked to the deployment of SUPERNOVA malware in target environments (Hacker News, CERT VU).

Mitigation and workarounds

SolarWinds has released multiple patches to address this vulnerability. Users should upgrade to one of the following versions: 2019.4 HF 6 (released December 14, 2020), 2020.2.1 HF 2 (released December 15, 2020), 2019.2 SUPERNOVA Patch (released December 23, 2020), 2018.4 SUPERNOVA Patch (released December 23, 2020), or 2018.2 SUPERNOVA Patch (released December 23, 2020). For systems that cannot be immediately updated, SolarWinds has provided a mitigation script available for download (CERT VU, SolarWinds Advisory).

Community reactions

The vulnerability gained significant attention due to its potential connection to the broader SolarWinds supply chain attack. Security researchers and organizations, including CISA, advised immediate patching of affected systems. Will Dormann from CERT noted the distinction between this vulnerability and other SolarWinds-related issues (AttackerKB).

Additional resources


SourceThis report was generated using AI

Related SolarWinds Platform vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-52606CRITICAL9.8
  • SolarWinds PlatformSolarWinds Platform
  • cpe:2.3:a:solarwinds:solarwinds_platform
NoYesFeb 11, 2025
CVE-2024-45715MEDIUM5.2
  • SolarWinds PlatformSolarWinds Platform
  • cpe:2.3:a:solarwinds:solarwinds_platform
NoYesOct 16, 2024
CVE-2024-52612MEDIUM4.8
  • SolarWinds PlatformSolarWinds Platform
  • cpe:2.3:a:solarwinds:solarwinds_platform
NoYesFeb 11, 2025
CVE-2024-45717MEDIUM4.8
  • SolarWinds PlatformSolarWinds Platform
  • cpe:2.3:a:solarwinds:solarwinds_platform
NoYesDec 04, 2024
CVE-2024-52611LOW3.5
  • SolarWinds PlatformSolarWinds Platform
  • cpe:2.3:a:solarwinds:solarwinds_platform
NoYesFeb 11, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management