The SolarWinds Orion API is vulnerable to an authentication bypass that could allow a remote attacker to execute API commands. This vulnerability could allow a remote attacker to bypass authentication and execute API commands which may result in a compromise of the SolarWinds instance. SolarWinds Orion Platform versions 2019.4 HF 5, 2020.2 with no hotfix installed, and 2020.2 HF 1 are affected.
Threat-Mapped Scoring
Score: 3.0
Priority: P2 - Serious (High)
S1 – Steal Customer Account Information
EPSS
Score: 0.94345 Percentile:
0.99948
CVSS Scoring
CVSS v3.1 Score: 9.8
Severity: CRITICAL
KEV is present
Mapped CWE(s)
CWE-288
: Authentication Bypass Using an Alternate Path or Channel
CWE-306
: Missing Authentication for Critical Function
All CAPEC(s)
CAPEC-12: Choosing Message Identifier
CAPEC-127: Directory Indexing
CAPEC-166: Force the System to Reset Values
CAPEC-216: Communication Channel Manipulation
CAPEC-36: Using Unpublished Interfaces or Functionality
CAPEC-62: Cross Site Request Forgery
CAPEC-665: Exploitation of Thunderbolt Protection Flaws