CVE-2021-35234
SolarWinds Platform vulnerability analysis and mitigation

Overview

CVE-2021-35234 is a privilege escalation vulnerability discovered in SolarWinds Orion Platform's Network Performance Monitor. The vulnerability was disclosed on December 20, 2021, affecting Orion Platform versions 2020.2.6 HF2 and earlier. The flaw exists in multiple exposed dangerous functions within Orion Core that allow for read-only SQL injection, enabling an attacker with low-user privileges to steal password hashes and password salt information (SolarWinds Advisory).

Technical details

The vulnerability exists within multiple functions of the SolarWinds.Orion.Core.Actions.dll module, including TextToSpeech, PlaySound, CustomStatus, CustomProperty, WriteToEventLog, Email, and SendSyslog classes. A crafted request can trigger execution of SQL queries composed from user-supplied strings. The vulnerability has received a CVSS v3.1 base score of 8.8 (High) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. Authentication is required to exploit this vulnerability (ZDI Advisory).

Impact

An attacker who successfully exploits this vulnerability can escalate privileges to the level of an application administrator. This elevated access allows the attacker to steal password hashes and password salt information, potentially compromising the security of the entire system (NVD).

Mitigation and workarounds

SolarWinds has released Orion Platform 2020.2.6 HF3 to address this vulnerability. For organizations unable to immediately apply the hotfix, a workaround is available by revoking 'Alert Management' and 'Report Management' rights for non-admin users. This can be done by logging into the Orion Web Console, navigating to Settings > All Settings > Manage Accounts, and ensuring both Allow Alert Management Rights and Allow Report Management Rights options are set to No for all non-admin users (SecMaster).

Additional resources


SourceThis report was generated using AI

Related SolarWinds Platform vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-52606CRITICAL9.8
  • SolarWinds PlatformSolarWinds Platform
  • cpe:2.3:a:solarwinds:solarwinds_platform
NoYesFeb 11, 2025
CVE-2024-45715MEDIUM5.2
  • SolarWinds PlatformSolarWinds Platform
  • cpe:2.3:a:solarwinds:solarwinds_platform
NoYesOct 16, 2024
CVE-2024-52612MEDIUM4.8
  • SolarWinds PlatformSolarWinds Platform
  • cpe:2.3:a:solarwinds:solarwinds_platform
NoYesFeb 11, 2025
CVE-2024-45717MEDIUM4.8
  • SolarWinds PlatformSolarWinds Platform
  • cpe:2.3:a:solarwinds:solarwinds_platform
NoYesDec 04, 2024
CVE-2024-52611LOW3.5
  • SolarWinds PlatformSolarWinds Platform
  • cpe:2.3:a:solarwinds:solarwinds_platform
NoYesFeb 11, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management