Regretfully, the same digital code-signing certificate used to sign our Orion Platform software affected by the SUNBURST vulnerability was also used to sign additional SolarWinds products not known to be affected by SUNBURST. While this does not mean all products are compromised, it does mean the day-to-day operation of any software signed by the compromised digital code-signing certificate may be impacted by a user’s operating system, antivirus, or endpoint protection software when the certificate is publicly revoked on March 8, 2021.
The full list of products is available in the table below.
We’ve obtained new digital code-signing certificates and have rebuilt the affected versions, are re-signing our code, and will re-release all of the products previously signed with the certificate to be revoked. To ensure the performance of your SolarWinds product(s), you must upgrade to these new builds before March 8, 2021.
FREQUENTLY ASKED QUESTIONS (FAQ)
- Why are some digital code-signing certificates being revoked?
- What do I need to do?
- Where can I find a list of affected products?
- The deadline to update my software is March 8, 2021. Can I update early?
- What will happen on March 8, 2021 once the affected digital code-signing certificates are revoked?
- How can I find out what version of Orion Platform products I’m running?
- Should I manually revoke the certificate if it’s found on my system before March 8, 2021?
- Can I just replace the revoked code-signing certificate with the new one and keep my software running?
- I’m getting alerts from my antivirus and/or endpoint protection software that affected SolarWinds software has a low reputation score, or that it’s untrusted. What does that mean?
- Why do I need to reinstall or update software that wasn’t a part of the SUNBURST incident?
- What about SolarWinds software either fully certified or in the process of being certified against Common Criteria?
- What if I’m out of maintenance?
QUESTION 1
Recent as of 1/13/2021
Why are some digital code-signing certificates being revoked?
QUESTION 2
Recent as of 1/13/2021
What do I need to do?
To minimize any operational impact, we recommend that customers using affected products update where possible or re-install those products before March 8, 2021.
- The list of products we’ve digitally re-signed is maintained in the table below, and we will provide the steps you should follow to update those products when these updates are available for download.
- We currently anticipate the first group of updates to be available the week of January 18 and will notify all customers when they are made available.
QUESTION 3
Recent as of 1/13/2021
Where can I find a list of affected products?
Products which will be digitally re-signed are as follows:
Orion Platform Products, which include:
- Orion Platform and SDK, Enterprise Operations Console (EOC)
- Networking: Network Performance Monitor (NPM), Network Configuration Manager (NCM), NetFlow Traffic Analyzer (NTA), Network Automation Manager (NAM), Application Centric Monitor (ACM), Network Operations Manager (NOM), IP Address Manager (IPAM), User Device Tracker (UDT), VoIP & Network Quality Manager (VNQM)
- Systems: Server & Application Monitor (SAM), Virtualization Manager (VMAN), Server Configuration Monitor (SCM), Storage Resource Monitor (SRM), Web Performance Monitor (WPM), Log Analyzer (LA)
- Database: Database Performance Analyzer (DPA), Database Performance Analyzer Integration Module (DPAIM)
Products Affected by Digital Code-Signing Certificate Revocation
Orion Platform Version |
Recommended Action |
2020.2.4 |
No action needed |
2020.2.1 HF 2 |
Upgrade to 2020.2.4 |
2019.4.2 |
No action needed |
2019.4 HF 6 |
Upgrade to 2020.2.4 |
Non-Orion Platform Products
Porfolio |
Product Name |
Affected Versions |
Database |
Database Performance Analyzer (DPA) |
2019.4.1 SR1 2020.2 2020.2 HF2 2020.2.1 SR1 2020.4 RC1 2020.4 RC2 2020.4 RC3 |
Security |
Security Event Manager (SEM) |
2019.4.1 2020.2 2020.2.1 2020.4 |
Access Rights Manager (ARM) |
2019.4.3 2020.2 2020.2.1 2020.2.2 2020.2.3 |
|
Patch Manager |
2020.2 2020.2.1 |
|
Application Performance Management |
Pingdom (versions of the WPM recorder) |
2020.2.0.6002 2020.2.1.6402 2020.2.2.6824 |
Paid Tools |
Kiwi CatTools |
3.11.6 |
Kiwi Syslog Server |
9.7.1 9.7 |
|
Dameware Remote Support |
12.1.1 |
|
Serv-U |
15.1.7 HF5 15.2 15.2.1 |
|
ipMonitor |
11.1.0 |
|
Engineer’s Tool Set |
2020.2 2020.2.1 2020.2.2 |
|
Mobile Admin |
8.2.2 8.2.3 |
QUESTION 4
Recent as of 1/13/2021
The deadline to update my software is March 8, 2021. Can I update early?
Yes, we recommend you update or reinstall as soon as possible, once we notify you the new software builds are available for download. We currently anticipate the first group of updates to be made available the week of January 18.
QUESTION 5
Recent as of 1/13/2021
What will happen on March 8, 2021 once the affected digital code-signing certificate is revoked?
Where affected SolarWinds software has been deployed, you may not see any immediate impact from the revocation of the digital code-signing certificate. However, we do expect the following scenarios could introduce an operational interruption:
- If you try to perform a fresh install of software signed with a revoked digital code-signing certificate: Your operating system will not allow you to install a fresh version of the software signed with the revoked certificate. Part of the installation process is a check to the Certificate Revocation List (CRL). That check will fail, as the certificate has been revoked, and the operating system will prevent installation.
- If you have an affected version already installed: If you try to install a component or add-on, the installation will be blocked by the same process as above.
- If you’re running a highly secure environment: Depending on which security controls have been implemented in your IT environment, affected SolarWinds products may cease operation once the code-signing certificate is revoked.
- Systems protected by antivirus and endpoint protection software: Based on the policy of your security software, and on how that security software acts with software signed with a revoked code-signing certificate, affected SolarWinds products may experience interruption sooner than the above-described scenarios.
QUESTION 6
Recent as of 1/13/2021
How can I find out what version of Orion Platform products I’m running?
QUESTION 7
Recent as of 1/13/2021
Should I manually revoke the digital code-signing certificate if it’s found on my system before March 8, 2021?
QUESTION 8
Recent as of 1/13/2021
Can I just replace the revoked digital code-signing certificate with the new one and keep my software running?
QUESTION 9
Recent as of 1/13/2021
I’m getting alerts from my antivirus and/or endpoint protection software that affected SolarWinds software has a low reputation score, or that it’s untrusted. What does that mean?
QUESTION 10
Recent as of 1/13/2021
Why do I need to reinstall or update software that wasn’t a part of the SUNBURST incident?
QUESTION 11
Recent as of 1/13/2021
What about SolarWinds software either fully certified or in the process of being certified against Common Criteria?
The only Common Criteria distribution affected by the revocation of the digital code-signing certificate is SolarWinds Access Rights Manager (ARM) 2020.2.1, which is under evaluation by the Singapore Common Criteria Scheme. ARM 2020.2.1 will be updated to 2020.2.4, which will be signed by a new digital code-signing certificate.
QUESTION 12
Recent as of 1/13/2021
What if I’m out of maintenance?