IT infrastructure management provider SolarWinds released a new update to its Orion networking monitoring tool with fixes for four security vulnerabilities, counting two weaknesses that could be exploited by an authenticated attacker to achieve remote code execution (RCE).

One is a JSON deserialization flaw that allows an authenticated user to execute arbitrary code via the test alert actions feature available in the Orion Web Console, which lets users simulate network events that can be configured to trigger an alert during setup. It has been rated critical in severity.

A second issue concerns a high-risk vulnerability that could be leveraged by an adversary to achieve RCE in the Orion Job Scheduler. “In order to exploit this, an attacker first needs to know the credentials of an unprivileged local account on the Orion Server,” SolarWinds said in its release notes.

The advisory is light on technical specifics, but the two shortcomings are said to have been reported via Trend Micro’s Zero Day Initiative.

Two other bugs, including a high-severity stored cross-site scripting (XSS) vulnerability in the “add custom tab” within customize view page (CVE-2020-35856) and a reverse tabnabbing and open redirect vulnerability in the custom menu item options page (CVE-2021-3109), both of which require an Orion administrator account for successful exploitation.

The new update also brings a number of security improvements, with fixes for preventing XSS attacks and enabling UAC protection for Orion database manager, among others.

Orion users are recommended to update to the latest release, “Orion Platform 2020.2.5,” to mitigate the risk associated with the security issues.