CVE-2023-35186
📋 TL;DR
This vulnerability allows authenticated users of SolarWinds Access Rights Manager to execute arbitrary code remotely by abusing SolarWinds services. It affects organizations using vulnerable versions of SolarWinds ARM, potentially enabling attackers to gain full control of affected systems.
💻 Affected Systems
- SolarWinds Access Rights Manager
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise leading to data theft, lateral movement across the network, and persistent backdoor installation.
Likely Case
Privilege escalation leading to unauthorized access to sensitive systems and data within the ARM environment.
If Mitigated
Limited impact due to network segmentation and strong authentication controls restricting authenticated user access.
🎯 Exploit Status
Exploitation requires authenticated access but appears straightforward based on CWE-502 (Deserialization of Untrusted Data).
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2023.2.1
Vendor Advisory: https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-35186
Restart Required: Yes
Instructions:
1. Download SolarWinds ARM 2023.2.1 from SolarWinds Customer Portal. 2. Backup current configuration. 3. Run installer with administrative privileges. 4. Restart services as prompted.
🔧 Temporary Workarounds
Restrict Access
allLimit network access to SolarWinds ARM to only trusted administrative networks and users.
Strengthen Authentication
allEnforce multi-factor authentication and strong password policies for all ARM user accounts.
🧯 If You Can't Patch
- Implement network segmentation to isolate SolarWinds ARM from critical systems.
- Monitor for unusual authentication patterns and file creation/modification activities on ARM servers.
🔍 How to Verify
Check if Vulnerable:
Check SolarWinds ARM version in the web interface under Help > About or via Windows Programs and Features.
Check Version:
Not applicable - check via GUI or Windows registry at HKEY_LOCAL_MACHINE\SOFTWARE\SolarWinds\Access Rights Manager
Verify Fix Applied:
Confirm version is 2023.2.1 or later in the ARM interface and verify services are running normally.
📡 Detection & Monitoring
Log Indicators:
- Unusual process creation from SolarWinds services
- Authentication from unexpected IP addresses
- Deserialization errors in application logs
Network Indicators:
- Unusual outbound connections from ARM server
- Traffic to unexpected ports from ARM service
SIEM Query:
source="solarwinds-arm" AND (event_type="process_creation" OR event_type="deserialization_error")
🔗 References
- https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2023-2-1_release_notes.htm
- https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-35186
- https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2023-2-1_release_notes.htm
- https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-35186