This article is more than 1 year old
Fistful of flaws blow away SolarWinds network appliances
Five nasties await netadmins
Admins of SolarWinds system management systems can block out a biggish chunk of their diaries to implement a bunch of serious patches.
There are five bugs of varying seriousness in the company's Log and Event Manager appliance discovered by KoreLogic and posted to Full Disclosure.
Four of the bugs depend on an attacker accessing the appliance's SSH shell and logging in as
cmc, if the admin has left that user's default password –
password – in place.
First, there's a
sudo path that's a privilege escalation vector: an attacker only needs a bit of directory traversal to execute commands as root.
There's also a script (
upgrade21.sh) that lets the attacker change permissions for any file, thereby rooting the system.
For good measure, the remaining bug doesn't depend on the defaults above. A Postgres database ships with default credentials, and while SolarWinds blocked it being attacked over IPv4, they missed the fix in IPv6.
SolarWinds has shipped a hotfix here. ®