Skip to main content

CVE-2025-26398: CWE-798 Use of Hard-coded Credentials in SolarWinds Database Performance Analyzer

Medium
VulnerabilityCVE-2025-26398cvecve-2025-26398cwe-798
Published: Tue Aug 12 2025 (08/12/2025, 08:10:54 UTC)
Source: CVE Database V5
Vendor/Project: SolarWinds
Product: Database Performance Analyzer

Description

SolarWinds Database Performance Analyzer was found to contain a hard-coded cryptographic key. If exploited, this vulnerability could lead to a machine-in-the-middle (MITM) attack against users. This vulnerability requires additional software not installed by default, local access to the server and administrator level privileges on the host.

AI-Powered Analysis

AILast updated: 08/12/2025, 08:32:53 UTC

Technical Analysis

CVE-2025-26398 is a medium-severity vulnerability identified in SolarWinds Database Performance Analyzer versions 2025.2 and below. The root cause is the presence of a hard-coded cryptographic key within the software, classified under CWE-798 (Use of Hard-coded Credentials). This cryptographic key is embedded in the product and cannot be changed by users, which poses a significant security risk. An attacker who gains local access to the server hosting the Database Performance Analyzer and possesses administrator-level privileges could exploit this vulnerability. Exploitation requires additional software components that are not installed by default, which somewhat limits the attack surface. If successfully exploited, the attacker could perform a man-in-the-middle (MITM) attack against users interacting with the Database Performance Analyzer, potentially intercepting or manipulating sensitive data. The CVSS v3.1 base score is 5.6, reflecting medium severity, with the vector indicating local attack vector (AV:L), high attack complexity (AC:H), requiring high privileges (PR:H), and user interaction (UI:R). The impact affects confidentiality and integrity but does not affect availability. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability requires a combination of local access, elevated privileges, and user interaction, which reduces the likelihood of widespread exploitation but still poses a risk in environments where insider threats or compromised administrator accounts exist.

Potential Impact

For European organizations, the impact of this vulnerability could be significant in environments where SolarWinds Database Performance Analyzer is deployed, particularly in critical infrastructure, financial institutions, and large enterprises that rely on database performance monitoring for operational stability. The ability to conduct MITM attacks could lead to unauthorized disclosure or alteration of sensitive database performance data, potentially undermining trust in monitoring results and leading to incorrect operational decisions. Furthermore, if attackers leverage this vulnerability as part of a broader attack chain, they could escalate privileges or move laterally within the network. Given the requirement for local administrator access and additional software, the threat is more relevant to insider threats or attackers who have already compromised internal systems. European organizations with strict data protection regulations (e.g., GDPR) could face compliance risks if sensitive data is exposed or integrity is compromised due to this vulnerability. The absence of known exploits reduces immediate risk, but the presence of hard-coded credentials is a critical security anti-pattern that should be addressed promptly to prevent future exploitation.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should take the following specific actions: 1) Immediately audit all instances of SolarWinds Database Performance Analyzer to identify affected versions (2025.2 and below). 2) Restrict local administrator access on servers running the software to trusted personnel only and implement strict access controls and monitoring to detect unauthorized access attempts. 3) Disable or remove any non-default additional software components that could facilitate exploitation unless absolutely necessary. 4) Employ network segmentation to isolate servers running the Database Performance Analyzer from less trusted network zones, reducing the risk of lateral movement. 5) Monitor logs and network traffic for unusual activities indicative of MITM attempts or privilege escalations. 6) Engage with SolarWinds for timely patch releases or workarounds; if no patch is available, consider temporary mitigation such as disabling vulnerable features or migrating to alternative solutions. 7) Implement multi-factor authentication and enhanced endpoint security controls on administrative accounts to reduce the risk of credential compromise. 8) Conduct security awareness training focused on insider threat risks and the importance of safeguarding administrative credentials.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SolarWinds
Date Reserved
2025-02-08T00:19:09.395Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689af8aaad5a09ad002f4ce0

Added to database: 8/12/2025, 8:17:46 AM

Last enriched: 8/12/2025, 8:32:53 AM

Last updated: 8/12/2025, 10:11:06 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats