SolarWinds addressed critical RCEs in Access Rights Manager (ARM)

SolarWinds addressed three critical vulnerabilities in its Access Rights Manager (ARM) solution, including two RCE bugs.

SolarWinds has fixed several Remote Code Execution (RCE) vulnerabilities in its Access Rights Manager (ARM) solution.

Access Rights Manager (ARM) is a software solution designed to assist organizations in managing and monitoring access rights and permissions within their IT infrastructure. This type of tool is crucial for maintaining security, compliance, and efficient administration of user access to various resources, systems, and data.

Below is the list of flaws addressed by the company:

ADVISORY CVE ID SEVERITY RELEASE DATE LAST UPDATE FIXED VERSION
SolarWinds Access Rights Manager (ARM) Deserialization of Untrusted Data Remote Code Execution Vulnerability CVE-2023-40057 9.0 Critical 02/06/2024 02/06/2024 SolarWinds Access Rights Manager (ARM) 2023.2.3
SolarWinds Access Rights Manager (ARM) Directory Traversal Remote Code Execution Vulnerability CVE-2024-23476 9.6 Critical 02/06/2024 02/06/2024 SolarWinds Access Rights Manager (ARM) 2023.2.3
SolarWinds Access Rights Manager (ARM) Traversal Remote Code Execution Vulnerability CVE-2024-23477 7.9 High 02/06/2024 02/06/2024 SolarWinds Access Rights Manager (ARM) 2023.2.3
SolarWinds Access Rights Manager (ARM) Deserialization of Untrusted Data Remote Code Execution Vulnerability CVE-2024-23478 8.0 High 02/06/2024 02/06/2024 SolarWinds Access Rights Manager (ARM) 2023.2.3
SolarWinds Access Rights Manager (ARM) Traversal Remote Code Execution Vulnerability CVE-2024-23479 9.6 Critical 02/06/2024 02/06/2024 SolarWinds Access Rights Manager (ARM) 2023.2.3
SQL Injection Remote Code Execution Vulnerability CVE-2023-50395 8.0 High 02/06/2024 02/06/2024 SolarWinds Platform 2024.1
SQL Injection Remote Code Execution Vulnerability CVE-2023-35188 8.0 High 02/06/2024 02/06/2024 SolarWinds Platform 2024.1

The three critical remote code execution flaws are:

  • CVE-2023-40057 (CVSS score 9.0): A deserialization of untrusted data issue. An authenticated user can exploit this vulnerability to abuse a SolarWinds service resulting in remote code execution.
  • CVE-2024-23479 (CVSS score 9.6): A Directory Traversal Remote Code Execution Vulnerability. An unauthenticated user can exploit this issue to achieve the Remote Code Execution.
  • CVE-2024-23476 (CVSS score 9.6) Directory Traversal Remote Code Execution Vulnerability. If exploited, this vulnerability allows an unauthenticated user to achieve the Remote Code Execution.

The company fixed the flaws with the release of Access Rights Manager 2023.2.3.

SolarWinds made the headlines in 2020, when Russia-linked APT group carried out a supply chain attack that compromised the Orion software provided by the company.

In a filing with US SEC, the company revealed that 18,000 customers might have been impacted by the cyber attack against its supply chain.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, SolarWinds)

Leave a Reply

Your email address will not be published. Required fields are marked *

Subscribe to our Newsletter