Rule Category

SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.

Alert Message

SERVER-WEBAPP SolarWinds Orion authentication bypass attempt

Rule Explanation

This particular rule looks for direct access to the web.config file, potentially allowing an unauthenticated user a glimpse into sensitive settings in Orion.

What To Look For

This rule will trigger against direct access to /web.config URI, which may be susceptible to the SkipAuthentication vulnerability described in CVE-2020-10148.

Known Usage

No public information

False Positives

No known false positives


Cisco Talos Intelligence Group

Rule Groups

No rule groups


Additional Links

Rule Vulnerability

Authentication Bypass

An Authentication Bypass occurs when there is a way to avoid providing user credentials to a system before performing restricted operations on said system.

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.
Loading description

MITRE ATT&CK Framework

Tactic: Initial Access

Technique: Exploit Public-Facing Application

For reference, see the MITRE ATT&CK vulnerability types here: