
Cloud Vulnerability DB
A community-led vulnerabilities database
The SolarWinds Platform was identified with a Deserialization of Untrusted Data vulnerability (CVE-2022-47507) that was disclosed in February 2023. This high-severity vulnerability affects SolarWinds Platform 2022.4.1 and allows a remote adversary with Orion admin-level account access to the SolarWinds Web Console to execute arbitrary commands (SolarWinds Advisory).
The vulnerability has been assigned a CVSS score of 8.8 (High), with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. The specific flaw exists within the WorkerProcessWCFProxy function, where the issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data (ZDI Advisory).
An attacker who successfully exploits this vulnerability can execute arbitrary code in the context of SYSTEM, potentially leading to complete system compromise. The vulnerability requires authentication but could allow for significant system access once exploited (ZDI Advisory).
SolarWinds released a patch for this vulnerability in SolarWinds Platform 2023.1. The company recommends customers upgrade to this version and follow the guidance provided in the SolarWinds Secure Configuration Guide. Additional security measures include avoiding exposure of the SolarWinds Platform website on the public internet, implementing proper network segmentation, and configuring firewalls to restrict port access, particularly for port 5671 (SolarWinds Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."