CVE-2024-23469

9.6 CRITICAL

📋 TL;DR

SolarWinds Access Rights Manager (ARM) has a critical remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary code with SYSTEM privileges. This affects all organizations running vulnerable versions of SolarWinds ARM. The vulnerability stems from improper input validation (CWE-20) that can be exploited remotely.

💻 Affected Systems

Products:
  • SolarWinds Access Rights Manager
Versions: Versions prior to 2024.3
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability requires network access to the ARM service.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, allowing attackers to install malware, steal credentials, pivot to other systems, and maintain persistent access to the network.

🟠

Likely Case

Initial access leading to ransomware deployment, data exfiltration, or lateral movement within the network.

🟢

If Mitigated

Limited impact if proper network segmentation, EDR solutions, and least privilege principles are implemented, though exploitation would still grant SYSTEM access on the ARM server.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows unauthenticated remote code execution, making it highly attractive to attackers. No public exploit code has been confirmed as of the provided information.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.3

Vendor Advisory: https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2024-3_release_notes.htm

Restart Required: Yes

Instructions:

1. Download SolarWinds ARM 2024.3 from the SolarWinds customer portal. 2. Backup current ARM configuration and database. 3. Run the installer with administrative privileges. 4. Follow the upgrade wizard. 5. Restart the ARM service or server as required.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to SolarWinds ARM servers to only trusted administrative networks

Firewall Rules

windows

Implement strict firewall rules to limit inbound connections to ARM servers

netsh advfirewall firewall add rule name="Block ARM External" dir=in action=block protocol=TCP localport=17778,17779 remoteip=any

🧯 If You Can't Patch

  • Isolate the ARM server from internet access and restrict internal network access to only necessary administrative systems
  • Implement application allowlisting and EDR solutions to detect and prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check the ARM version in the SolarWinds ARM web interface under Help > About. If version is below 2024.3, the system is vulnerable.

Check Version:

Not applicable - version check must be performed through the ARM web interface

Verify Fix Applied:

After patching, verify the version shows 2024.3 or higher in the ARM interface and test that the ARM service is functioning normally.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation events from the ARM service
  • Failed authentication attempts followed by successful exploitation
  • Windows Event Log entries showing unexpected SYSTEM privilege usage

Network Indicators:

  • Unusual outbound connections from ARM server
  • Traffic to known malicious IPs from ARM server
  • Unexpected network scanning originating from ARM server

SIEM Query:

source="windows" AND (process_name="cmd.exe" OR process_name="powershell.exe") AND parent_process="SolarWinds.ARM.Service.exe"

🔗 References

📤 Share & Export