[Tech-l] Update on SolarWinds Security Alert

Brian Hoehner hoehner at mveca.org
Tue Dec 15 07:48:27 EST 2020


All,

See below.  If you have SolarWinds products you should be aware by now of their breach.  As you can see below we (MVECA) were not a victim.

If you have an Orion based product please disconnect it from your network until you can get it updated.  If you are unsure there is a link to the list of known infected products below.  The note below also lists software believed not to be infected.

Thanks,
Brian Hoehner
Director of Operations
Miami Valley Educational Computer Association (MVECA)
937-767-1468 x3119

[cid:image001.jpg at 01CE981F.38D95B60]



From: Kevin Thompson <noreply at solarwinds.com<mailto:noreply at solarwinds.com>>
Sent: Monday, December 14, 2020 7:27 PM
To: Timothy Grant <grant at mveca.org<mailto:grant at mveca.org>>
Subject: Update on SolarWinds Security Alert


View Online <https://itsm.solarwinds.com/index.php/email/emailWebview?mkt_tok=eyJpIjoiWXpNM1pEYzFZVGsxT0dVMCIsInQiOiJzMHJENjc0T3hhb05BTG96RWhiM0MyWEx3TWtRNUl6aXlsUXZoRUp1WFNLM1d6bXJDbGRsVEczZ0x2UWQwMGIyTHBTbHN3bi81V1ZXbmRQeTdhMDhxWmVmMFFMQTVPc1RGYVgvN2xNdUNsWVB0RW4xcmN6VSswakQyUzg2c3Q0RyJ9>



[SolarWinds | The Power to Manage IT]<http://itsm1.solarwinds.com/dc/xXwBeusar0b5kKp3iDd1qnC3Ue-jzcesazQGPjCX5Rk=/dv0Qi8d9JJ0S300JGy010E0>



Dear Customer,

You are receiving this email because you are a customer who owns SolarWinds products that we believe, based on our investigations to date, are NOT AFFECTED by the vulnerability in our Orion Platform products identified in our public statements and recent news reports.

We have been made aware of a cyberattack to our systems that inserted a vulnerability within our SolarWinds® Orion® Platform software builds for versions 2019.4 HF 5, 2020.2 with no hotfix, and 2020.2 HF 1 only. We have been advised that this incident was likely the result of a highly sophisticated, targeted, and manual supply chain attack by an outside nation state, but we have not independently verified the identity of the attacker.

We have scanned the code of all of our software products for markers similar to those used in the attack on our Orion Platform products identified above, and we have found no evidence that other versions of our Orion Platform products or our other products contain those markers. As such, we are not aware that other versions of Orion Platform products have been impacted by this security vulnerability. Other non-Orion Platform products are also not known by us to be impacted by this security vulnerability.

If you aren’t sure which version of the Orion Platform products you are using, see directions on how to check that here<http://itsm1.solarwinds.com/M90S0J03EJG8v00zQ0iJ0e1>. To check which hotfix updates you have applied, please go here<http://itsm1.solarwinds.com/p0G00E08AS0J0f9JvQ0i3J1>.

Products believed to be NOT AFFECTED by this security vulnerability are:

8Man

Access Rights Manager (ARM)

AppOptics

Backup Document

Backup Profiler

Backup Profiler

Backup Server

Backup Workstation

CatTools

Dameware Mini Remote Control

Dameware Patch Manager

Dameware Remote Everywhere

Dameware Remote Manager

Database Performance Analyzer (DPA)

Database Performance Monitor (DPM)

DNSstuff

Engineer’s Toolset

Engineer's Web Toolset

FailOver Engine

Firewall Security Monitor

Identity Monitor

ipMonitor

Kiwi CatTools

Kiwi Syslog Server

LANSurveyor

Librato

Log & Event Manager (LEM)

Log & Event Manager Workstation Edition

Loggly

Mobile Admin

Network Topology Mapper (NTM)

Papertrail

Patch Manager

Pingdom

Pingdom Server Monitor

Security Event Manager (SEM)

Security Event Manager Workstation Edition

Server Configuration Monitor (SCM)

Server Profiler

Service Desk

Serv-U FTP Server

Serv-U Gateway

Serv-U MFT Server

Storage Manager

Storage Profiler

Threat Monitor

Virtualization Profiler

Web Help Desk

SQL Sentry

DB Sentry

V Sentry

Win Sentry

BI Sentry

SentryOne Document

SentryOne Test

Task Factory

DBA xPress (Free)

Plan Explorer (Fee)

APS Sentry (EOL)

DW Sentry (EOL)

SQL Sentry Essentials (EOL)

SentryOne Monitor (EOL)

BI xPress (EOL)


At this time, we are not aware of an impact to our SolarWinds MSP products, including RMM and N-central. Additionally, we are not aware of any SolarWinds free tools or any of our agents that were affected by this vulnerability.

Our investigations and remediation efforts for these matters are still ongoing, and we will continue to update the Security Advisory page<http://itsm1.solarwinds.com/TB9EJ0i080003Jg10QGJvS0> on our website as more information becomes available to us throughout our investigations.

Visit www.solarwinds.com/securityadvisory<http://itsm1.solarwinds.com/K00JGEJ00QJh1Cv3i0890S0> for more detailed information.

We also encourage you to review the Form 8-K that we filed this morning with the SEC. You can find this filing on the investor relations page<http://itsm1.solarwinds.com/M90S0J03EJG8v00DQ0iJ0i1> of our website and on the SEC’s website.

Security and trust in our software are the foundation of our commitment to our customers. Thank you for your continued patience and partnership as we continue to work through this issue.

Sincerely,

Kevin Thompson
President & CEO
SolarWinds, Inc










[Network]<http://itsm1.solarwinds.com/dc/xXwBeusar0b5kKp3iDd1qqGUT7Nxv_vyqB3jO0k2VQSuigWhue1NdFTqLL7IL_4lOK_AFFlvSVwzI2UtTE64yg==/dv0Qi8d9JJ0S300JGy010E0>

[Applications]<http://itsm1.solarwinds.com/dc/xXwBeusar0b5kKp3iDd1qgF6xZqbfZk4u9hcxxw1HoINQ4reqD4PoPZaGod6lQRHOXBOumCt88aysbtT5JXmHw==/dv0Qi8d9JJ0S300JGy010E0>

[Database]<http://itsm1.solarwinds.com/dc/xXwBeusar0b5kKp3iDd1qjkUoYy9u-fSbTFbK_PiE2cI1Zt09evFhX14oMkLVT3eglqbhqNNHLBzF4_8kvoQkW_4dhjat-M1ojbqzK2pShA=/dv0Qi8d9JJ0S300JGy010E0>


[Security]<http://itsm1.solarwinds.com/dc/xXwBeusar0b5kKp3iDd1qq8tsRXcN7J4kMuO7dpU98LBfYV7Lem53DnfD1jYcDdtt9tk5wAFSRYusewzKafCcKdspYkTzlNYeY-z3Qnet70=/dv0Qi8d9JJ0S300JGy010E0>

[IT Help Desk]<http://itsm1.solarwinds.com/dc/xXwBeusar0b5kKp3iDd1quvxn5xg1xJlINpxSq3NX--b4yhYPSLyZqX57LZ6PRzS/dv0Qi8d9JJ0S300JGy010E0>

[Cloud]<http://itsm1.solarwinds.com/dc/xXwBeusar0b5kKp3iDd1qrWMJzirP-FcAjBikx9cAHsyciLAA983gKpccu15i75l/dv0Qi8d9JJ0S300JGy010E0>





This email was sent to: grant at mveca.org<http://itsm1.solarwinds.com/dc/VEtvJKCE-IE6sy5Sj6AQwAD1UIUKn4lSwEv3dg8pHRk=/dv0Qi8d9JJ0S300JGy010E0>

Unsubscribe<http://itsm1.solarwinds.com/dc/nFY2ebWXhJfpWsVdAL8QkUYH9KYFh3KIjX6GzkrSStQBs2dG9a1wzoRtDYMDTl4s1lY2SWbD3UP6XgOvZoVmLQ==/dv0Qi8d9JJ0S300JGy010E0> | Change Preferences<http://itsm1.solarwinds.com/dc/nFY2ebWXhJfpWsVdAL8QkUYH9KYFh3KIjX6GzkrSStQBs2dG9a1wzoRtDYMDTl4s1lY2SWbD3UP6XgOvZoVmLQ==/dv0Qi8d9JJ0S300JGy010E0>

SolarWinds, 7171 Southwest Parkway, Building 400, Austin, TX 78735 | www.solarwinds.com<http://itsm1.solarwinds.com/dc/5Geu3fRir2bLRKyiEEiG2n3sfiG4Gvv6Yxyw6RwgW5g=/dv0Qi8d9JJ0S300JGy010E0>





-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://listserv.mveca.org/pipermail/tech-l/attachments/20201215/060576b3/attachment.htm>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image005.jpg
Type: image/jpeg
Size: 3473 bytes
Desc: image005.jpg
URL: <http://listserv.mveca.org/pipermail/tech-l/attachments/20201215/060576b3/attachment.jpg>


More information about the Tech-l mailing list