Vulnerability Description

The United States Cybersecurity & Infrastructure Security Agency (CISA) has advised that an advanced persistent threat (APT) actor was able to insert sophisticated malware into officially signed and released updates to the SolarWinds network management software [1]. The attacks have been ongoing since at least March 2020 and CISA has warned that many high-value targets within government, critical infrastructure, and the private sector have been compromised. Private security firm FireEye has also disclosed that the attackers were able to steal their private collection of hacking tools and techniques used for security audits [2].

Exposure and Impact

Successful compromise through the SolarWinds Orion backdoor could lead to complete compromise of a targeted network. Compromised network management software (NMS) provides deep access for an attacker to move laterally through a network and obtain credentials. Although not all organizations installing the backdoored version of the SolarWinds Orion software were necessarily compromised, all such organizations must assume that their network may be fully compromised.

Remediation & Mitigation

Tripwire VERT recommends that all organizations review their systems for indicators of compromise related to the malicious SolarWinds updates as well as the FireEye Red Team Tools. Detected compromises should be handled through a security incident response process.

Detection

ASPL-920 includes the following Windows DRT checks related to the SolarWinds backdoor and associated exploitation:

  • SolarWinds netsetupsvc.dll Library Installed (ID: 467518)
  • SolarWinds SolarWinds.Orion.Core.BusinessLayer.dll Library Backdoor (ID: 467516)

ASPL-920 also includes the following checks for all vulnerabilities exploited by the FireEye hacking tools:

  • CVE-2019-11510
    • Title: SA44101 – 2019-04: Pulse Connect Secure CVE-2019-11510 Arbitrary File Reading Vulnerability
    • ID: 432095 (non-DRT)
  • CVE-2020-1472
    • Title: MS-2020-Aug: Netlogon Elevation of Privilege Vulnerability
    • ID: 451635 (Windows DRT)
    • SSH-DRT IDs: 459913, 459873, 459499, 459474, 459423, 459367, 459366, 459365, 459318, 459212, 459211, 459179
  • CVE-2018-13379
    • Title: FortiOS CVE-2018-13379 Path Traversal Vulnerability