{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-36958","assignerOrgId":"49f11609-934d-4621-84e6-e02e032104d6","assignerShortName":"SolarWinds","datePublished":"2022-10-20T20:10:01.367Z","dateUpdated":"2025-05-08T13:25:48.824Z","dateReserved":"2022-07-27T00:00:00.000Z"},"containers":{"cna":{"title":"SolarWinds Platform Deserialization of Untrusted Data","datePublic":"2022-10-19T00:00:00.000Z","providerMetadata":{"orgId":"49f11609-934d-4621-84e6-e02e032104d6","shortName":"SolarWinds","dateUpdated":"2022-10-20T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with valid access to SolarWinds Web Console to execute arbitrary commands."}],"affected":[{"vendor":"SolarWinds","product":"SolarWinds Platform","versions":[{"version":"unspecified","lessThanOrEqual":"2022.3 and prior versions","status":"affected","versionType":"custom"}]},{"vendor":"SolarWinds","product":"Orion Platform","versions":[{"version":"unspecified","lessThanOrEqual":"2020.2.6 HF5 and prior versions","status":"affected","versionType":"custom"}]}],"references":[{"url":"https://www.solarwinds.com/trust-center/security-advisories/CVE-2022-36958"},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-17567"}],"credits":[{"lang":"en","value":"SolarWinds would like to thank Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative for reporting on the issue in a responsible manner."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-502 Deserialization of Untrusted Data","cweId":"CWE-502"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"SolarWinds recommends customers upgrade to SolarWinds Platform version 2022.4 as soon as it becomes available. The expected RC release is at the end of October. SolarWinds also recommends that customers follow the guidance provided in the SolarWinds Secure Configuration Guide (https://documentation.solarwinds.com/en/success_center/orionplatform/content/core-secure-configuration.htm). Ensure only authorized users can access the SolarWinds Platform."}],"solutions":[{"lang":"en","value":"SolarWinds recommends customers upgrade to SolarWinds Platform version 2022.4 as soon as possible."}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T10:21:32.213Z"},"title":"CVE Program Container","references":[{"url":"https://www.solarwinds.com/trust-center/security-advisories/CVE-2022-36958","tags":["x_transferred"]},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-CAN-17567","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-08T13:25:42.786016Z","id":"CVE-2022-36958","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-08T13:25:48.824Z"}}]}}