9.8
CVE-2020-10148
- EPSS 94.3%
- Veröffentlicht 29.12.2020 22:15:12
- Zuletzt bearbeitet 24.10.2025 14:36:09
- Quelle cret@cert.org
- CVE-Watchlists
- Unerledigt
The SolarWinds Orion API is vulnerable to an authentication bypass that could allow a remote attacker to execute API commands. This vulnerability could allow a remote attacker to bypass authentication and execute API commands which may result in a compromise of the SolarWinds instance. SolarWinds Orion Platform versions 2019.4 HF 5, 2020.2 with no hotfix installed, and 2020.2 HF 1 are affected.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Solarwinds ≫ Orion Platform Version2019.4 Updatehotfix5
Solarwinds ≫ Orion Platform Version2020.2 Update-
Solarwinds ≫ Orion Platform Version2020.2.1 Updatehotfix1
03.11.2021: CISA Known Exploited Vulnerabilities (KEV) Catalog
SolarWinds Orion Authentication Bypass Vulnerability
SchwachstelleSolarWinds Orion API contains an authentication bypass vulnerability that could allow a remote attacker to execute API commands.
BeschreibungApply updates per vendor instructions.
Erforderliche Maßnahmen| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 94.3% | 0.999 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-288 Authentication Bypass Using an Alternate Path or Channel
The product requires authentication, but the product has an alternate path or channel that does not require authentication.
CWE-306 Missing Authentication for Critical Function
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.