HTTP: SolarWinds Orion Patch Manager WSAsyncExecuteTasks.aspx Insecure Deserialization

This signature detects attempts to exploit a known vulnerability against SolarWinds Orion Patch Manager. A successful attack can lead to arbitrary code execution.

Extended Description

Insecure Deserialization of untrusted data remote code execution vulnerability was discovered in Patch Manager Orion Platform Integration module. An Authenticated Attacker with network access via HTTP can compromise this vulnerability can result in Remote Code Execution.

Affected Products

Solarwinds patch_manager

Short Name
HTTP:CTS:SOLRWIN-ORION-INSC-DES
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2021-35216 CVE-2021-35217 Deserialization Insecure Manager Orion Patch SolarWinds WSAsyncExecuteTasks.aspx
Release Date
11/18/2021
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3590
False Positive
Unknown
Vendors

Solarwinds

CVSS Score

6.5

9.0

Found a potential security threat?