CVE-2024-23474

7.6 HIGH

📋 TL;DR

CVE-2024-23474 is a vulnerability in SolarWinds Access Rights Manager that allows attackers to delete arbitrary files and disclose sensitive information. This affects organizations using vulnerable versions of SolarWinds ARM, potentially leading to data loss and unauthorized access to system information.

💻 Affected Systems

Products:
  • SolarWinds Access Rights Manager
Versions: Versions prior to 2024.3
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability exists in the web interface component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical system files combined with credential disclosure, leading to service disruption and lateral movement.

🟠

Likely Case

Unauthorized deletion of application files and disclosure of configuration data, potentially enabling further attacks.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, restricting file operations to non-critical areas.

🌐 Internet-Facing: HIGH if exposed to internet without proper controls, as attackers could directly exploit the vulnerability.
🏢 Internal Only: MEDIUM as internal attackers could exploit this for privilege escalation or data exfiltration.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires some knowledge of the application structure but follows predictable patterns common to path traversal vulnerabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.3

Vendor Advisory: https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2024-3_release_notes.htm

Restart Required: Yes

Instructions:

1. Download SolarWinds ARM 2024.3 from the SolarWinds customer portal. 2. Run the installer with administrative privileges. 3. Follow the upgrade wizard. 4. Restart the ARM service after installation completes.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to the ARM web interface to trusted IP addresses only.

File System Permissions

windows

Apply strict file system permissions to limit what files the ARM service account can access.

icacls "C:\Program Files\SolarWinds\ARM" /deny "ARM_Service_Account":(OI)(CI)(DE,DC)

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the ARM web interface.
  • Enable detailed logging and monitor for unusual file deletion or access patterns.

🔍 How to Verify

Check if Vulnerable:

Check the ARM version in the web interface under Help > About. If version is below 2024.3, the system is vulnerable.

Check Version:

Not applicable - check via web interface or Windows Programs and Features

Verify Fix Applied:

Verify the version shows 2024.3 or higher after patching and test that file operations through the interface are properly restricted.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file deletion events in Windows Event Logs
  • Multiple failed file access attempts from single source

Network Indicators:

  • Unusual HTTP requests to ARM web interface with file path parameters
  • Traffic patterns suggesting directory traversal attempts

SIEM Query:

source="windows" event_id="4663" object_name="*SolarWinds*" | stats count by src_ip

🔗 References

📤 Share & Export