Documentation forSecurity Event Manager

SEM 2025.2.1 release notes

Release date: July 2, 2025

Last updated: September 18, 2025

Fixed CVEs: September 18, 2025

Here's what's new in SEM 2025.2.1. You can find the applicable system requirements here.

To view release notes, system requirements, and product guide PDFs for supported versions of SEM, see SEM previous versions. To view release notes for multiple versions and multiple SolarWinds Platform products on a single page, see the release notes aggregator.

New features and improvements in SEM

Other improvements

Implemented upgrades for improved security.

Fixed CVEs

At SolarWinds, we prioritize the swift resolution of CVEs to ensure the security and integrity of our software. In this release, we have successfully addressed the following CVEs.

Third-party CVEs

We were not affected by the current Java and Open JDK issues. See SolarWinds Products and Oracle Java SE and OpenJDK Vulnerabilities.

CVE-ID Vulnerability title Description Severity
CVE-2024-7348 Debian Security Advisory DSA-5745-1 https://lists.debian.org/debian-security-announce/2024/msg00157.html See the Debian security announcement for more information about the CVEs included in this update.
CVE-2024-10976, CVE-2024-10977, CVE-2024-10978, CVE-2024-10979 Debian Security Advisory DSA-5812-1 https://lists.debian.org/debian-security-announce/2024/msg00226.html See the Debian security announcement for more information about the CVEs included in this update.
CVE-2024-56406 Debian Security Advisory DSA-5902-1 https://lists.debian.org/debian-security-announce/2025/msg00064.html See the Debian security announcement for more information about the CVEs included in this update.
CVE-2023-52857, CVE-2023-52927, CVE-2024-24855, CVE-2024-26656, CVE-2024-26767, CVE-2024-26982, CVE-2024-27056, CVE-2024-35866, CVE-2024-38611, CVE-2024-40973, CVE-2024-42129, CVE-2024-43831, CVE-2024-46772, CVE-2024-47753, CVE-2024-47754, CVE-2024-50056, CVE-2024-50246, CVE-2024-53166, CVE-2024-57977, CVE-2024-58002, CVE-2024-58005, CVE-2024-58079, CVE-2024-58090, CVE-2025-21702, CVE-2025-21712, CVE-2025-21721, CVE-2025-21756, CVE-2025-21838, CVE-2025-21844, CVE-2025-21846, CVE-2025-21848, CVE-2025-21855, CVE-2025-21858, CVE-2025-21859, CVE-2025-21862, CVE-2025-21864, CVE-2025-21865, CVE-2025-21866, CVE-2025-21867, CVE-2025-21871, CVE-2025-21875, CVE-2025-21877, CVE-2025-21878, CVE-2025-21881, CVE-2025-21887, CVE-2025-21891, CVE-2025-21898, CVE-2025-21899, CVE-2025-21904, CVE-2025-21905, CVE-2025-21909, CVE-2025-21910, CVE-2025-21912, CVE-2025-21913, CVE-2025-21914, CVE-2025-21916, CVE-2025-21917, CVE-2025-21918, CVE-2025-21919, CVE-2025-21920, CVE-2025-21922, CVE-2025-21924, CVE-2025-21925, CVE-2025-21926, CVE-2025-21928, CVE-2025-21934, CVE-2025-21935, CVE-2025-21936, CVE-2025-21937, CVE-2025-21938, CVE-2025-21941, CVE-2025-21943, CVE-2025-21944, CVE-2025-21945, CVE-2025-21947, CVE-2025-21948, CVE-2025-21950, CVE-2025-21951, CVE-2025-21956, CVE-2025-21957, CVE-2025-21959, CVE-2025-21960, CVE-2025-21962, CVE-2025-21963, CVE-2025-21964, CVE-2025-21968, CVE-2025-21970, CVE-2025-21971, CVE-2025-21975, CVE-2025-21978, CVE-2025-21979, CVE-2025-21980, CVE-2025-21981, CVE-2025-21986, CVE-2025-21991, CVE-2025-21992, CVE-2025-21993, CVE-2025-21994, CVE-2025-21996, CVE-2025-21997, CVE-2025-21999, CVE-2025-22004, CVE-2025-22005, CVE-2025-22007, CVE-2025-22008, CVE-2025-22010, CVE-2025-22014, CVE-2025-22015 Debian Security Advisory DSA-5900-1 https://lists.debian.org/debian-security-announce/2025/msg00062.html See the Debian security announcement for more information about the CVEs included in this update.
CVE-2023-53034, CVE-2024-36908, CVE-2024-46733, CVE-2024-46742, CVE-2024-46753, CVE-2024-46774, CVE-2024-46816, CVE-2024-46823, CVE-2024-50063, CVE-2025-21853, CVE-2025-22025, CVE-2025-22027, CVE-2025-22033, CVE-2025-22035, CVE-2025-22038, CVE-2025-22040, CVE-2025-22041, CVE-2025-22042, CVE-2025-22044, CVE-2025-22045, CVE-2025-22049, CVE-2025-22050, CVE-2025-22054, CVE-2025-22055, CVE-2025-22056, CVE-2025-22058, CVE-2025-22060, CVE-2025-22063, CVE-2025-22066, CVE-2025-22071, CVE-2025-22072, CVE-2025-22073, CVE-2025-22075, CVE-2025-22079, CVE-2025-22081, CVE-2025-22086, CVE-2025-22088, CVE-2025-22089, CVE-2025-22093, CVE-2025-22095, CVE-2025-22097, CVE-2025-22126, CVE-2025-23136, CVE-2025-23138, CVE-2025-37785, CVE-2025-37838, CVE-2025-38152, CVE-2025-38575, CVE-2025-38637, CVE-2025-39728, CVE-2025-39735 Debian Security Advisory DSA-5907-1 https://lists.debian.org/debian-security-announce/2025/msg00069.html See the Debian security announcement for more information about the CVEs included in this update.
CVE-2025-32728 In sshd in OpenSSH before 10.0, the DisableForwarding directive does not adhere to the documentation stating that it disables X11 and agent forwarding. https://security-tracker.debian.org/tracker/CVE-2025-32728 See the Debian security announcement for more information about the CVEs included in this update.

Fixed customer issues

Case number Description Platform product
01931103 Offline license activations for new templates can now be done through the customer portal.  
N/A SWIP certificate now works across all existing SEM instances.  
01901593 All CPUs are now able to deploy the SEM appliance.  
01930712 Java has been updated on SEM Agent and SEM Manager, so scans against the appliance or agents are no longer reported as vulnerable.  
01897353, 01947364 The connector update process now automatically updates connectors as intended.  

Installation or upgrade

For new installations, you can download the installation file from the product page on https://www.solarwinds.com or from the Customer Portal. For more information, see the SEM Installation and Upgrade Guide.

To prevent access by unauthorized users, SolarWinds recommends setting up your SEM appliance with no access to the Internet or any public-facing network. For additional security recommendations, see Secure your SEM deployment > Review the SEM security checklists located in the SEM Administrator Guide.

For upgrades, see Upgrade SEM in the SEM Administrator Guide to determine the upgrade path, review best practices for SEM upgrades, and upgrade the SEM components.

End of life

Version EoL announcement EoE effective date EoL effective date
2023.4 October 16, 2024: End-of-Life (EoL) announcement – Customers on SEM version 2023.4 or earlier should begin transitioning to the latest version of SEM. April 15, 2025: End-of-Engineering (EoE) – Service releases, bug fixes, workarounds, and service packs for SEM version 2023.4 or earlier will no longer actively be supported by SolarWinds. October 16, 2025: End-of-Life (EoL) – SolarWinds will no longer provide technical support for SEM version 2023.4.

See the End of Life Policy for information about SolarWinds product life cycle phases. To see EoL dates for earlier SEM versions, see SEM release history.

Deprecation notice

The following platforms and features are still supported in the current release. However, they will be unsupported in a future release. Plan on upgrading deprecated platforms, and avoid using deprecated features.

Operating Systems  

As of SEM 2025.4, SolarWinds will no longer provide SEM agents for these operating systems because they do not support Java 17.

  • Solaris on Intel
  • Solaris on Sparc
  • HPUX on Itanium

Legal notices

© 2025 SolarWinds Worldwide, LLC. All rights reserved.

This document may not be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole or in part, or translated to any electronic medium or other means without the prior written consent of SolarWinds. All right, title, and interest in and to the software, services, and documentation are and shall remain the exclusive property of SolarWinds, its affiliates, and/or its respective licensors.

SOLARWINDS DISCLAIMS ALL WARRANTIES, CONDITIONS, OR OTHER TERMS, EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE, ON THE DOCUMENTATION, INCLUDING WITHOUT LIMITATION NONINFRINGEMENT, ACCURACY, COMPLETENESS, OR USEFULNESS OF ANY INFORMATION CONTAINED HEREIN. IN NO EVENT SHALL SOLARWINDS, ITS SUPPLIERS, NOR ITS LICENSORS BE LIABLE FOR ANY DAMAGES, WHETHER ARISING IN TORT, CONTRACT OR ANY OTHER LEGAL THEORY, EVEN IF SOLARWINDS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

The SolarWinds, SolarWinds & Design, Orion, and THWACK trademarks are the exclusive property of SolarWinds Worldwide, LLC or its affiliates, are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks or are registered or pending registration. All other trademarks mentioned herein are used for identification purposes only and are trademarks of (and may be registered trademarks) of their respective companies.