SolarWinds Database Performance Analyzer < 2025.3 Hard-coded Cryptographic Key (CVE-2025-26398)

medium Nessus Plugin ID 299666

Synopsis

The remote host has an installation of SolarWinds Database Performance Analyzer that is affected by a hard-coded cryptographic key vulnerability.

Description

According to its self-reported version, the SolarWinds Database Performance Analyzer (DPA) installation on the remote host is prior to 2025.3. It is, therefore, affected by a hard-coded cryptographic key vulnerability.

If exploited, this vulnerability could allow a machine-in-the-middle (MITM) attack against users. Exploitation requires additional software not installed by default, local access to the server, and administrator level privileges on the host.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update SolarWinds Database Performance Analyzer to version 2025.3 or later.

See Also

http://www.nessus.org/u?a9b306ea

Plugin Details

Severity: Medium

ID: 299666

File Name: solarwinds_dpa_CVE-2025-26398.nasl

Version: 1.1

Type: local

Agent: windows, macosx, unix

Family: Misc.

Published: 2/20/2026

Updated: 2/20/2026

Configuration: Enable thorough checks (optional)

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 5.3

Vector: CVSS2#AV:L/AC:H/Au:M/C:C/I:C/A:N

CVSS Score Source: CVE-2025-26398

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Vector: CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N

Vulnerability Information

CPE: cpe:/a:solarwinds:database_performance_analyzer

Required KB Items: installed_sw/SolarWinds Database Performance Analyzer

Exploit Ease: No known exploits are available

Patch Publication Date: 8/12/2025

Vulnerability Publication Date: 8/12/2025

Reference Information

CVE: CVE-2025-26398

IAVB: 2025-B-0146