Wednesday, February 26, 2025
HomeCyber Security NewsSolarWinds Platform 2023.3 Released - What's New!

SolarWinds Platform 2023.3 Released – What’s New!

Published on

SIEM as a Service

Follow Us on Google News

SolarWinds announces the release of SolarWinds Platform 2023.3, which includes new features and platform upgrades.

Further, the release notes detail the issues that were resolved in the version. The company announced end-of-life plans for modules based on Orion Platform 2020.2.6 and earlier.

New Updates

  • Support for OpenSSL 3.0
  • In the Configuration Wizard, IIS Centralised Certificate Store can be used for the website.
  • AlertStack cluster lifetime was added to automatically close alert stacks after 7 days.
  • Modifiable WorldWide Map API key support for WorldWide Map updates.
  • SolarWinds Platform Maps updates support for dynamically showing the SolarWinds Platform Map on group details views depending on the group name variable.

Fixes Available

The Buffer Overflow Vulnerability tracked as CVE-2022-37434 with a ‘Critical’ Severity Range has been specifically included in this release.

“zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field”, the company explains.

Only applications that use inflateGetHeader are affected. Some popular apps may include the affected zlib source code but may be unable to call inflateGetHeader.

The Cross-Site Scripting Vulnerability tracked as CVE-2020-7656 with a ‘High’ severity range has been included in the release.

Particularly, SolarWinds Platform 2023.3 includes 10 medium-severity vulnerabilities in the SolarWinds platform, including third-party CVEs.

To Install or Upgrade

To begin an upgrade, including options to pre-stage the installation files, go to Settings > My Deployment to initiate the upgrade.  The SolarWinds Installer upgrades your complete deployment (including all SolarWinds Platform products and scalability engines).

You can obtain the installation file for new installations from the product page at https://www.solarwinds.com or via the Customer Portal.

Furthermore, SolarWinds advises users to promptly upgrade their products to the latest version available.

Keep yourself informed with the latest news on Cyber Security by following us on GoogleNewsLinkedinTwitterand Facebook.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Google Issues Warning on Phishing Campaigns Targeting Higher Education Institutions

Google, in collaboration with its Mandiant Threat Intelligence team, has issued a warning about...

TgToxic Android Malware Updated it’s Features to Steal Login Credentials

The TgToxic Android malware, initially discovered in July 2022, has undergone significant updates, enhancing...

Hackers Exploiting Cisco Small Business Routers RCE Vulnerability Deploying Webshell

A critical remote code execution (RCE) vulnerability, CVE-2023-20118, affecting Cisco Small Business Routers, has...

Malicious npm Package Targets Developers for Supply Chain Attack

The Socket Research Team has uncovered a malicious npm package@ton-wallet/create designed to steal sensitive...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Google Issues Warning on Phishing Campaigns Targeting Higher Education Institutions

Google, in collaboration with its Mandiant Threat Intelligence team, has issued a warning about...

TgToxic Android Malware Updated it’s Features to Steal Login Credentials

The TgToxic Android malware, initially discovered in July 2022, has undergone significant updates, enhancing...

Hackers Exploiting Cisco Small Business Routers RCE Vulnerability Deploying Webshell

A critical remote code execution (RCE) vulnerability, CVE-2023-20118, affecting Cisco Small Business Routers, has...