CVE-2024-23476

9.6 CRITICAL

📋 TL;DR

SolarWinds Access Rights Manager (ARM) contains a directory traversal vulnerability that allows unauthenticated attackers to execute arbitrary code remotely. This affects organizations using vulnerable versions of SolarWinds ARM, potentially compromising the entire system and connected resources.

💻 Affected Systems

Products:
  • SolarWinds Access Rights Manager
Versions: Specific versions not detailed in provided references; consult SolarWinds advisory for exact affected versions
Operating Systems: Windows (typical for SolarWinds ARM deployments)
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability requires network access to the ARM service.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to data theft, lateral movement across the network, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Initial foothold leading to privilege escalation, credential harvesting, and deployment of additional malware payloads.

🟢

If Mitigated

Limited impact if network segmentation, strict firewall rules, and endpoint protection prevent successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unauthenticated exploitation lowers the barrier for attackers. Directory traversal to RCE typically involves predictable exploitation paths.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SolarWinds advisory for specific patched version

Vendor Advisory: https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-23476

Restart Required: Yes

Instructions:

1. Review SolarWinds advisory for affected versions. 2. Download and apply the latest patch from SolarWinds. 3. Restart the SolarWinds ARM service. 4. Verify patch installation through version check.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to SolarWinds ARM to only trusted administrative networks

Web Application Firewall Rules

all

Implement WAF rules to block directory traversal patterns and suspicious file operations

🧯 If You Can't Patch

  • Isolate the SolarWinds ARM server from internet and non-essential internal networks
  • Implement strict network monitoring and alerting for suspicious file access patterns

🔍 How to Verify

Check if Vulnerable:

Check SolarWinds ARM version against affected versions listed in the vendor advisory

Check Version:

Check within SolarWinds ARM web interface under Help > About, or examine installed program version in Windows

Verify Fix Applied:

Verify installed version matches or exceeds the patched version specified by SolarWinds

📡 Detection & Monitoring

Log Indicators:

  • Unusual file path access patterns in web server logs
  • Unexpected process creation from SolarWinds ARM service
  • Failed authentication attempts followed by successful exploitation

Network Indicators:

  • Unusual outbound connections from SolarWinds ARM server
  • Suspicious file transfer patterns to/from the ARM server

SIEM Query:

source="solarwinds_arm" AND (path="*../*" OR process="cmd.exe" OR process="powershell.exe")

🔗 References

📤 Share & Export