9.8
CVSSv3

CVE-2021-25274

Published: 03/02/2021 Updated: 08/02/2021
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 891
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The Collector Service in SolarWinds Orion Platform prior to 2020.2.4 uses MSMQ (Microsoft Message Queue) and doesn't set permissions on its private queues. As a result, remote unauthenticated clients can send messages to TCP port 1801 that the Collector Service will process. Additionally, upon processing of such messages, the service deserializes them in insecure manner, allowing remote arbitrary code execution as LocalSystem.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

solarwinds orion platform

Recent Articles

More patches for SolarWinds Orion after researchers find flaw allowing low-priv users to execute code, among others
The Register • Gareth Corfield • 03 Feb 2021

Probably not used by last year's US government-busting attackers, though US court system ditches electronic filing, goes paper-only for sensitive documents following SolarWinds hack

As if that supply chain attack wasn't bad enough, SolarWinds has had to patch its Orion software again after eagle-eyed researchers discovered fresh vulnerabilities – including one that can be exploited to achieve remote code execution. Ziv Mador, security research veep at Trustwave, the firm that found the flaws, told The Register: "It's very severe, not only because of the ability to run unauthorized code on the Orion platform, but also because anyone on the network, not even someone that ha...