SolarWinds Vulnerability Actively Exploited by Threat Actors

Related

Critical Atlassian Bamboo Flaw Enables Command Injection Attacks

What happened Atlassian has disclosed two security vulnerabilities affecting Bamboo...

Microsoft Releases Emergency Patches for Critical ASP.NET Core Flaw

What happened Microsoft has released an out-of-band security update to...

New npm Supply-Chain Attack Self-Spreads to Steal Auth Tokens

What happened A self-propagating npm supply chain attack has been...

Unsecured Perforce Servers Expose Sensitive Data From Major Organizations

What happened Security researcher Morgan Robertson conducted an analysis of...

Critical Flaw in Protobuf Library Enables JavaScript Code Execution

What happened A critical remote code execution vulnerability has been...

Share

What happened

A critical vulnerability in SolarWinds products is being actively exploited by threat actors to compromise enterprise networks. According to the report, the flaw affects a core SolarWinds component used for monitoring and management, enabling unauthenticated attackers to perform unauthorized actions on vulnerable deployments exposed to untrusted networks. Researchers observed real-world exploitation where attackers executed arbitrary commands and manipulated system behavior by sending crafted requests to the affected interface. The issue has been assigned a high severity due to its widespread deployment across infrastructure environments and the potential impact of successful exploitation. Although SolarWinds released advisories and mitigation guidance, multiple campaign sightings indicate that exploitation is ongoing against internet-accessible systems that have not yet applied the recommended updates.

Who is affected

Organisations running vulnerable SolarWinds products that are reachable from untrusted networks are affected, as active exploitation can allow attackers to execute unauthorized commands and control compromised systems.

Why CISOs should care

Active exploitation of a vulnerability in a widely used infrastructure management platform underscores the risk of delayed patching and the importance of protecting critical monitoring and management systems against compromise that can facilitate deeper network intrusion.

3 practical actions

  • Update SolarWinds deployments. Apply the latest security patches or updates recommended by the vendor to remediate the vulnerability.
  • Restrict external access. Limit exposure of SolarWinds interfaces to trusted networks and apply access controls.
  • Monitor for exploitation indicators. Review logs and telemetry for anomalous communications or unauthorized commands.