{"id":7578,"date":"2020-12-15T21:15:11","date_gmt":"2020-12-16T04:15:11","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7578"},"modified":"2023-04-05T12:41:38","modified_gmt":"2023-04-05T19:41:38","slug":"vulnerability-analysis-solarwinds-orion-network-management","status":"publish","type":"post","link":"https:\/\/10.42.32.162\/articles\/vulnerability-analysis-solarwinds-orion-network-management\/","title":{"rendered":"Vulnerability Analysis: SolarWinds Orion Network Management"},"content":{"rendered":"
\n

The SolarWinds Orion Platform Software is a Network Management tool that is widely used by over 300,000 customers worldwide. Entities like defense, government agencies, software companies, and Fortune 500 organizations use this platform to monitor IT stack from infrastructure to application. SolarWinds confirmed in its security advisory<\/a> that Orion update versions 2019.4 through 2020.2.1, released between March 2020 and June 2020, have been infected with malware known as SUNBURST\/Solorigate.<\/span><\/span><\/strong><\/p>\n<\/blockquote>\n

Security agencies in the US are in a panic because SolarWinds is a widely used and popular product. Here are a few details that would help you understand the gravity of this breach. <\/span><\/span><\/p>\n

Orion is used by the following:<\/span><\/span><\/p>\n