CVE-2023-35188 Overview
A SQL Injection Remote Code Execution vulnerability has been identified in the SolarWinds Platform. The vulnerability exists within the handling of CREATE statements, allowing authenticated attackers to inject malicious SQL commands that can lead to remote code execution on affected systems. While user authentication is required to exploit this vulnerability, the potential impact remains significant given SolarWinds Platform's role in enterprise network monitoring and management infrastructure.
Critical Impact
Authenticated attackers can leverage SQL injection via CREATE statements to achieve remote code execution on SolarWinds Platform deployments, potentially compromising network monitoring infrastructure and gaining access to sensitive network data.
Affected Products
- SolarWinds Platform (versions prior to 2024.1)
- SolarWinds Orion Platform deployments
- Enterprise network monitoring installations using vulnerable SolarWinds Platform versions
Discovery Timeline
- 2024-02-06 - CVE-2023-35188 published to NVD
- 2025-02-26 - Last updated in NVD database
Technical Details for CVE-2023-35188
Vulnerability Analysis
This vulnerability is classified as CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), commonly known as SQL Injection. The flaw resides in how the SolarWinds Platform processes CREATE statements within its database operations. When user-supplied input is incorporated into these SQL statements without proper sanitization or parameterization, attackers can manipulate the query structure to execute arbitrary SQL commands.
The attack requires adjacent network access and low-privilege authentication, meaning an attacker must have some level of valid credentials and be positioned on an adjacent network segment to exploit this vulnerability. Once exploited, the SQL injection can be escalated to achieve remote code execution, potentially through SQL Server features like xp_cmdshell or similar command execution mechanisms commonly available in enterprise database environments.
Root Cause
The root cause of this vulnerability stems from improper input validation and lack of parameterized queries when handling CREATE statements in the SolarWinds Platform. User-controlled input is directly concatenated or interpolated into SQL queries without adequate sanitization, allowing attackers to break out of the intended query context and inject malicious SQL commands. This represents a fundamental secure coding failure in handling dynamic SQL generation.
Attack Vector
The attack vector for CVE-2023-35188 requires the attacker to be positioned on an adjacent network (not directly accessible from the internet) and possess valid low-privilege credentials for the SolarWinds Platform. The exploitation flow involves:
- Authenticating to the SolarWinds Platform with valid credentials
- Locating the vulnerable functionality that processes CREATE statements
- Crafting malicious input containing SQL injection payloads
- Submitting the crafted input to manipulate the underlying SQL query
- Escalating from SQL injection to remote code execution through database features
The vulnerability does not require user interaction beyond the attacker's own actions, and the impact is contained to the vulnerable system (unchanged scope) but affects confidentiality, integrity, and availability at high levels.
Detection Methods for CVE-2023-35188
Indicators of Compromise
- Unusual CREATE statement patterns in SolarWinds Platform database logs containing escape characters, comment sequences (--, /*), or stacked queries (;)
- Unexpected execution of system stored procedures such as xp_cmdshell, sp_OACreate, or other command execution functions
- Anomalous process spawning from SQL Server processes (sqlservr.exe) or SolarWinds Platform services
- Authentication events followed by database errors or unusual query patterns
Detection Strategies
- Deploy database activity monitoring to detect SQL injection patterns in CREATE statements, including suspicious character sequences and query structure anomalies
- Monitor SolarWinds Platform application logs for authentication events followed by database operation failures or unexpected behaviors
- Implement network-based intrusion detection rules to identify SQL injection payloads in traffic to SolarWinds Platform servers
- Enable SQL Server audit logging to capture and analyze all CREATE statement executions for suspicious patterns
Monitoring Recommendations
- Configure SIEM alerts for SQL injection attack patterns targeting SolarWinds Platform infrastructure
- Establish baseline behavior for CREATE statement usage and alert on statistical deviations
- Monitor for privilege escalation attempts and lateral movement originating from SolarWinds Platform servers
- Review authentication logs for compromised credentials that may be used to exploit this vulnerability
How to Mitigate CVE-2023-35188
Immediate Actions Required
- Upgrade SolarWinds Platform to version 2024.1 or later immediately, as this version contains the security fix for CVE-2023-35188
- Audit user accounts with access to the SolarWinds Platform and remove unnecessary privileges
- Implement network segmentation to restrict access to SolarWinds Platform from untrusted network segments
- Review authentication logs for any suspicious activity that may indicate prior exploitation attempts
Patch Information
SolarWinds has addressed this vulnerability in the SolarWinds Platform 2024.1 release. Organizations should upgrade to this version or later to remediate CVE-2023-35188. The patch information and release notes are available through the SolarWinds Platform 2024.1 Release Notes. Additional details about the vulnerability can be found in the SolarWinds Security Advisory for CVE-2023-35188.
Workarounds
- Implement web application firewall (WAF) rules to block common SQL injection patterns in requests to SolarWinds Platform
- Restrict network access to SolarWinds Platform to only authorized management networks and administrators
- Enable enhanced database logging and monitoring to detect exploitation attempts until patching can be completed
- Consider temporarily restricting functionality that processes CREATE statements if operationally feasible
# Network segmentation example - restrict SolarWinds Platform access
# Configure firewall rules to limit access to management network only
# Example using iptables (adjust for your environment)
iptables -A INPUT -p tcp --dport 443 -s 10.0.0.0/24 -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


