CVE-2024-23466
📋 TL;DR
This vulnerability allows unauthenticated attackers to traverse directories and execute arbitrary code with SYSTEM privileges on SolarWinds Access Rights Manager. All organizations running vulnerable versions of SolarWinds ARM are affected, potentially leading to complete system compromise.
💻 Affected Systems
- SolarWinds Access Rights Manager
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system takeover with SYSTEM privileges, enabling data theft, ransomware deployment, and persistent backdoor installation across the network.
Likely Case
Initial access leading to privilege escalation, lateral movement, and credential harvesting from the compromised ARM server.
If Mitigated
Limited impact if network segmentation and strict access controls prevent exploitation attempts from reaching vulnerable systems.
🎯 Exploit Status
Directory traversal combined with RCE typically has low exploitation complexity. Unauthenticated access makes this particularly dangerous.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2024.3
Vendor Advisory: https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2024-3_release_notes.htm
Restart Required: Yes
Instructions:
1. Download SolarWinds ARM 2024.3 from the SolarWinds customer portal. 2. Backup current configuration and database. 3. Run the installer with administrative privileges. 4. Restart the ARM service and verify functionality.
🔧 Temporary Workarounds
Network Segmentation
allIsolate ARM server from untrusted networks and restrict access to authorized IPs only
Web Application Firewall
allDeploy WAF with directory traversal and RCE protection rules
🧯 If You Can't Patch
- Immediately remove internet-facing exposure and restrict network access to ARM server
- Implement strict monitoring and alerting for suspicious file access patterns and process creation
🔍 How to Verify
Check if Vulnerable:
Check ARM version in SolarWinds ARM web interface under Help > About. If version is earlier than 2024.3, system is vulnerable.
Check Version:
Not applicable - check via web interface or Windows Services for ARM version
Verify Fix Applied:
Verify version shows 2024.3 or later in Help > About. Test directory traversal attempts should be blocked.
📡 Detection & Monitoring
Log Indicators:
- Unusual file path access patterns in ARM logs
- Unexpected process creation with SYSTEM privileges
- Failed authentication attempts followed by successful exploitation
Network Indicators:
- Unusual outbound connections from ARM server
- Traffic patterns indicating file upload or code execution
SIEM Query:
source="solarwinds-arm" AND (path="*../*" OR process="*powershell*" OR process="*cmd*" OR user="SYSTEM")