CVE-2024-23473

8.6 HIGH

📋 TL;DR

This CVE describes a hard-coded credential vulnerability in SolarWinds Access Rights Manager that allows authentication bypass to the RabbitMQ management console. Attackers can exploit this to gain unauthorized access to messaging services. All systems running vulnerable versions of SolarWinds ARM are affected.

💻 Affected Systems

Products:
  • SolarWinds Access Rights Manager
Versions: Versions prior to 2023.2.4
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration with hard-coded credentials for RabbitMQ management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of RabbitMQ messaging infrastructure leading to data exfiltration, service disruption, and lateral movement within the network.

🟠

Likely Case

Unauthorized access to RabbitMQ management console allowing message queue manipulation, configuration changes, and potential privilege escalation.

🟢

If Mitigated

Limited impact if network segmentation prevents access to RabbitMQ ports and proper authentication controls are in place.

🌐 Internet-Facing: HIGH if RabbitMQ management interface is exposed to internet, as hard-coded credentials provide easy authentication bypass.
🏢 Internal Only: HIGH as internal attackers or compromised systems can easily exploit this vulnerability using the hard-coded credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires knowledge of hard-coded credentials but is straightforward once obtained. No authentication needed beyond credential use.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2023.2.4

Vendor Advisory: https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-23473

Restart Required: Yes

Instructions:

1. Download SolarWinds ARM 2023.2.4 from SolarWinds Customer Portal. 2. Backup current configuration. 3. Run installer with administrative privileges. 4. Restart services as prompted.

🔧 Temporary Workarounds

Network Segmentation

all

Block external and unnecessary internal access to RabbitMQ management port (default 15672)

# Windows Firewall: New-NetFirewallRule -DisplayName "Block RabbitMQ Management" -Direction Inbound -LocalPort 15672 -Protocol TCP -Action Block
# Linux iptables: iptables -A INPUT -p tcp --dport 15672 -j DROP

Credential Rotation

linux

Manually change RabbitMQ credentials if immediate patching not possible

rabbitmqctl change_password guest new_secure_password
rabbitmqctl set_permissions -p / guest ".*" ".*" ".*"

🧯 If You Can't Patch

  • Implement strict network access controls to RabbitMQ management interface (port 15672)
  • Monitor for unauthorized access attempts to RabbitMQ services and review authentication logs

🔍 How to Verify

Check if Vulnerable:

Check SolarWinds ARM version in web interface (Settings > About) or via PowerShell: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like "*Access Rights Manager*"} | Select-Object Version

Check Version:

Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like "*Access Rights Manager*"} | Select-Object Version

Verify Fix Applied:

Verify version is 2023.2.4 or later and test RabbitMQ management console access with old hard-coded credentials (should fail)

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts to RabbitMQ with hard-coded credentials
  • Successful logins to RabbitMQ management console from unexpected sources
  • Configuration changes to RabbitMQ without authorized change tickets

Network Indicators:

  • TCP connections to port 15672 from unauthorized IP addresses
  • Unusual RabbitMQ API calls or management interface access patterns

SIEM Query:

source="rabbitmq.log" AND ("authentication failed" OR "Login succeeded") | stats count by src_ip, user

🔗 References

📤 Share & Export