{
	"id": "e93339bb-c448-487a-a476-0e3944a63837",
	"created_at": "2026-04-06T00:19:25.098766Z",
	"updated_at": "2026-04-10T03:21:25.465401Z",
	"deleted_at": null,
	"sha1_hash": "59b955c25937595b1265742cf0faf98ef1bf1a58",
	"title": "Cisco Security Advisory: SolarWinds Orion Platform Supply Chain Attack",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 35096,
	"plain_text": "Cisco Security Advisory: SolarWinds Orion Platform Supply\r\nChain Attack\r\nPublished: 2020-12-18 · Archived: 2026-04-05 22:50:27 UTC\r\nDue to the recent announcement by SolarWinds regarding compromises in their supply chain, SolarWinds\r\nhas released a security advisory providing guidance on assessing and remediating this issue:\r\nhttps://www.solarwinds.com/securityadvisory\r\nCisco recommends that customers assess if they have used an affected version of SolarWinds Orion\r\nPlatform and, if so, take the following actions:\r\n1. Follow the guidance provided by the U.S. Department of Homeland Security and in the SolarWinds\r\nSecurity Advisory.\r\n2. Determine the need to change credentials on all devices being managed by the affected SolarWinds\r\nplatform software. This includes:\r\nUser credentials\r\nSimple Network Management Protocol (SNMP) version 2c community strings\r\nSNMP version 3 user credentials\r\nInternet Key Exchange (IKE) preshared keys\r\nShared secrets for TACACS, TACACS+, and RADIUS\r\nSecrets for Border Gateway Protocol (BGP), OSPF, Exterior Gateway Routing Protocol\r\n(EIGRP), or other routing protocols\r\nExportable RSA keys and certificates for Secure Shell (SSH) or other protocols\r\nWhile there are no vulnerabilities in Cisco products related to this issue, if a customer was using an\r\naffected version of SolarWinds Orion Platform and would like to investigate potential impact to Cisco\r\ndevices, Cisco has published a number of documents that can help the investigation. Please consult\r\nhttps://sec.cloudapps.cisco.com/security/center/resources/ir_escalation_guidance.\r\nFor information on Cisco’s use of SolarWinds in our enterprise environment, consult our Event Response\r\nPage here: https://sec.cloudapps.cisco.com/security/center/resources/solarwinds_orion_event_response\r\nCisco TALOS has also published guidance regarding this issue that can be viewed here:\r\nhttps://blog.talosintelligence.com/2020/12/solarwinds-supplychain-coverage.html\r\nCustomers that need assistance with Incident Response activities can contact Cisco TALOS here:\r\nhttps://talosintelligence.com/incident_response\r\nCisco will update this advisory as needed, if additional information becomes available.\r\nSource: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-solarwinds-supply-chain-attack\r\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-solarwinds-supply-chain-attack\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-solarwinds-supply-chain-attack"
	],
	"report_names": [
		"cisco-sa-solarwinds-supply-chain-attack"
	],
	"threat_actors": [],
	"ts_created_at": 1775434765,
	"ts_updated_at": 1775791285,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/59b955c25937595b1265742cf0faf98ef1bf1a58.pdf",
		"text": "https://archive.orkl.eu/59b955c25937595b1265742cf0faf98ef1bf1a58.txt",
		"img": "https://archive.orkl.eu/59b955c25937595b1265742cf0faf98ef1bf1a58.jpg"
	}
}