CVE-2021-35216
SolarWinds Patch Manager Agent vulnerability analysis and mitigation

Overview

A remote code execution vulnerability (CVE-2021-35216) was discovered in the SolarWinds Patch Manager Orion Platform Integration module. The vulnerability stems from insecure deserialization of untrusted data and affects Patch Manager versions 2020.2.5 and earlier. The vulnerability was discovered and reported by security researcher Jangggggg working with Trend Micro's Zero Day Initiative (ZDI Advisory, SolarWinds Advisory).

Technical details

The vulnerability exists within the EditResourceControls endpoint of the Patch Manager application. The issue results from the lack of proper validation of user-supplied data, which can lead to deserialization of untrusted data. The vulnerability has received a CVSS v3.1 base score of 8.8 (High) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H according to NVD, while SolarWinds assigned it a score of 8.9 (High) with vector string CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L (NVD, ZDI Advisory).

Impact

If successfully exploited, this vulnerability allows an authenticated attacker with network access via HTTP to execute arbitrary code in the context of NETWORK SERVICE on the affected system. The vulnerability can lead to complete system compromise, potentially affecting the confidentiality, integrity, and availability of the system (ZDI Advisory).

Mitigation and workarounds

SolarWinds has released version 2020.2.6 of Patch Manager to address this vulnerability. Users are advised to upgrade to this version to mitigate the risk (SolarWinds Advisory).

Additional resources


SourceThis report was generated using AI

Related SolarWinds Patch Manager Agent vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2021-35217HIGH8.8
  • SolarWinds Patch Manager AgentSolarWinds Patch Manager Agent
  • cpe:2.3:a:solarwinds:patch_manager
NoYesSep 08, 2021
CVE-2021-35216HIGH8.8
  • SolarWinds Patch Manager AgentSolarWinds Patch Manager Agent
  • cpe:2.3:a:solarwinds:patch_manager
NoYesSep 01, 2021
CVE-2021-27240HIGH7.8
  • SolarWinds Patch Manager AgentSolarWinds Patch Manager Agent
  • cpe:2.3:a:solarwinds:patch_manager
NoYesMar 29, 2021

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management