CVE-2022-38108

SolarWinds Platform Deserialization of Untrusted Data

Description

SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.

Remediation

Solution:

  • SolarWinds recommends customers upgrade to SolarWinds Platform version 2022.4 as soon as possible.

Workaround:

  • SolarWinds recommends customers upgrade to SolarWinds Platform version 2022.4 as soon as it becomes available. The expected RC release is at the end of October. SolarWinds also recommends that customers follow the guidance provided in the SolarWinds Secure Configuration Guide (https://documentation.solarwinds.com/en/success_center/orionplatform/content/core-secure-configuration.htm). Ensure only authorized users can access the SolarWinds Platform. Special attention should be given to the following points from documentation: • Be careful not to expose your SolarWinds Platform website on the public Internet. If you must enable outbound Internet access from SolarWinds Servers, create a strict allow list and block all other traffic. See SolarWinds Platform Product Features Affected by Internet Access (https://support.solarwinds.com/SuccessCenter/s/article/Orion-Platform-Product-Features-Affected-by-Internet-Access). • Disable unnecessary ports, protocols, and services on your host operating system and on applications, like SQL Server. For more details, see the SolarWinds Port Requirements guide (https://documentation.solarwinds.com/en/success_center/orionplatform/content/core-solarwinds-port-requirements.htm) and Best practices for configuring Windows Defender Firewall (© 2021 Microsoft, available at https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-firewall/best-practices-configuring, obtained on January 13, 2021.) • Apply proper segmentation controls on the network where you have deployed the SolarWinds Platform and SQL Server instances. • Configure the firewall for the main polling engine to limit and restrict all inbound and outbound access for port 5671. Port 5671 should only communicate to your other SolarWinds Servers (in case of High Availability, both Active and Standby Primary Polling Engine Servers). You can check these by querying the OrionServers table in the SolarWinds Platform database. Ensure this rule is updated when the configuration of SolarWinds Platform changes, for example when you add new servers.

Category

7.2
CVSS
Severity: High
CVSS 3.1 •
EPSS 84.75% Top 5%
Vendor Advisory solarwinds.com
Affected: SolarWinds SolarWinds Platform
Affected: SolarWinds Orion Platform
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2022-38108?
CVE-2022-38108 has been scored as a high severity vulnerability.
How to fix CVE-2022-38108?
To fix CVE-2022-38108: SolarWinds recommends customers upgrade to SolarWinds Platform version 2022.4 as soon as possible.
Is CVE-2022-38108 being actively exploited in the wild?
It is possible that CVE-2022-38108 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~85% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2022-38108?
CVE-2022-38108 affects SolarWinds SolarWinds Platform, SolarWinds Orion Platform.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.