Insecure deserialization leading to Remote Code Execution was detected in the Orion Platform version 2020.2.5. Authentication is required to exploit this vulnerability.
                
            References
                    | Link | Resource | 
|---|---|
| https://documentation.solarwinds.co/enm/success_center/orionplatform/content/release_notes/orion_platform_2020-2-6_release_notes.htm | Broken Link | 
| https://documentation.solarwinds.com/en/success_center/orionplatform/content/core-secure-configuration.htm | Product Vendor Advisory | 
| https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35215 | Patch Vendor Advisory | 
| https://www.zerodayinitiative.com/advisories/ZDI-21-1245/ | Third Party Advisory VDB Entry | 
| https://documentation.solarwinds.co/enm/success_center/orionplatform/content/release_notes/orion_platform_2020-2-6_release_notes.htm | Broken Link | 
| https://documentation.solarwinds.com/en/success_center/orionplatform/content/core-secure-configuration.htm | Product Vendor Advisory | 
| https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35215 | Patch Vendor Advisory | 
| https://www.zerodayinitiative.com/advisories/ZDI-21-1245/ | Third Party Advisory VDB Entry | 
Configurations
                    History
                    21 Nov 2024, 06:12
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : 6.5
         v3 : 8.9  | 
| References | () https://documentation.solarwinds.co/enm/success_center/orionplatform/content/release_notes/orion_platform_2020-2-6_release_notes.htm - Broken Link | |
| References | () https://documentation.solarwinds.com/en/success_center/orionplatform/content/core-secure-configuration.htm - Product, Vendor Advisory | |
| References | () https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35215 - Patch, Vendor Advisory | |
| References | () https://www.zerodayinitiative.com/advisories/ZDI-21-1245/ - Third Party Advisory, VDB Entry | 
03 Nov 2021, 20:23
| Type | Values Removed | Values Added | 
|---|---|---|
| References | (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-1245/ - Third Party Advisory, VDB Entry | 
28 Oct 2021, 12:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
09 Sep 2021, 19:31
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : 6.5
         v3 : 8.8  | 
| References | (MISC) https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35215 - Patch, Vendor Advisory | |
| References | (MISC) https://documentation.solarwinds.co/enm/success_center/orionplatform/content/release_notes/orion_platform_2020-2-6_release_notes.htm - Broken Link | |
| References | (MISC) https://documentation.solarwinds.com/en/success_center/orionplatform/content/core-secure-configuration.htm - Product, Vendor Advisory | |
| CPE | cpe:2.3:a:solarwinds:orion_platform:*:*:*:*:*:*:*:* | |
| CWE | CWE-502 | 
01 Sep 2021, 15:19
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2021-09-01 15:15
Updated : 2024-11-21 06:12
NVD link : CVE-2021-35215
Mitre link : CVE-2021-35215
CVE.ORG link : CVE-2021-35215
JSON object : View
Products Affected
                solarwinds
- orion_platform
 
CWE
                
                    
                        
                        CWE-502
                        
            Deserialization of Untrusted Data
