Vulnerability Description

The USA Cybersecurity & Infrastructure Safety Company (CISA) has suggested that a sophisticated persistent menace (APT) actor was capable of insert refined malware into formally signed and launched updates to the SolarWinds community administration software program [1]. The assaults have been ongoing since not less than March 2020 and CISA has warned that many high-value targets inside authorities, crucial infrastructure, and the personal sector have been compromised. Non-public safety agency FireEye has additionally disclosed that the attackers have been capable of steal their personal assortment of hacking instruments and strategies used for safety audits [2].

Publicity and Impression

Profitable compromise by the SolarWinds Orion backdoor might result in full compromise of a focused community. Compromised community administration software program (NMS) gives deep entry for an attacker to maneuver laterally by a community and acquire credentials. Though not all organizations putting in the backdoored model of the SolarWinds Orion software program have been essentially compromised, all such organizations should assume that their community could also be totally compromised.

Tripwire VERT recommends that each one organizations evaluate their methods for indicators of compromise associated to the malicious SolarWinds updates in addition to the FireEye Pink Staff Instruments. Detected compromises must be dealt with by a safety incident response course of.


ASPL-920 contains the next Home windows DRT checks associated to the SolarWinds backdoor and related exploitation:

SolarWinds netsetupsvc.dll Library Put in (ID: 467518)SolarWinds SolarWinds.Orion.Core.BusinessLayer.dll Library Backdoor (ID: 467516)

ASPL-920 additionally contains the next checks for all vulnerabilities exploited by the FireEye hacking instruments:

CVE-2019-11510Title: SA44101 – 2019-04: Pulse Join Safe CVE-2019-11510 Arbitrary File Studying VulnerabilityID: 432095 (non-DRT)CVE-2020-1472Title: MS-2020-Aug: Netlogon Elevation of Privilege VulnerabilityID: 451635 (Home windows DRT)SSH-DRT IDs: 459913, 459873, 459499, 459474, 459423, 459367, 459366, 459365, 459318, 459212, 459211, 459179CVE-2018-13379Title: FortiOS CVE-2018-13379 Path Traversal VulnerabilityID: 466495 (SSH-DRT & Non-DRT)CVE-2018-15961Title: APSB18-33: Adobe ColdFusion Unrestricted File Add Arbitrary Code Execution VulnerabilityID: 447353 (Home windows DRT), 447352 (SSH-DRT), 447310 (WebApp)CVE-2019-0604Title: MS-2019-Feb: Microsoft SharePoint Distant Code Execution Vulnerability IID: 416822 (Home windows DRT)CVE-2019-0708Title: MS-2019-Could: Distant Desktop Providers Distant Code Execution VulnerabilityID: 422448 (Home windows DRT & Non-DRT)CVE-2019-11580Title: Atlassian Crowd CVE-2019-11580 pdkinstall VulnerabilityID: 35222 (Non-DRT & WebApp)CVE-2019-19781Title: Citrix ADC Utility Arbitrary Code Execution CVE-2019-19781 VulnerabilityID: 437315 (Non-DRT)CVE-2020-10189Title: Zoho ManageEngine CVE-2020-10189 Cewolfservlet RCE VulnerabilityID: 467510 (Non-DRT)CVE-2020-10189Title: Zoho ManageEngine CVE-2020-10189 Cewolfservlet Deserialization VulnerabilityID: 467515 (Non-DRT)CVE-2014-1812Title: MS14-025: Group Coverage Preferences Elevation of Privilege VulnerabilityID: 94146 (Home windows DRT)CVE-2019-3398Title: Atlassian Confluence Safety Advisory 2019-04-17: Downloadallattachments Useful resource Path Traversal VulnerabilityID: 422182 (WebApp)CVE-2020-0688Title: MS-2020-Feb: Microsoft Change Reminiscence Corruption VulnerabilityID: 440153 (Home windows DRT & Non-DRT)CVE-2016-0167Title: MS16-039: Win32ok Elevation of Privilege VulnerabilityID: 226259 (Home windows DRT)CVE-2017-11774Title: MS-2017-Oct: Microsoft Outlook Safety Function Bypass VulnerabilityID: 313178 (Home windows DRT)CVE-2018-8581Title: MS-2018-Nov: Microsoft Change Server Elevation of Privilege VulnerabilityID: 412491 (Home windows DRT)CVE-2019-8394Title: Zoho ManageEngine Service Desk Plus CVE-2019-8394 File Add VulnerabilityID: 467517 (Home windows DRT & Non-DRT)