CVE-2024-23478
📋 TL;DR
SolarWinds Access Rights Manager (ARM) contains a deserialization vulnerability that allows authenticated users to execute arbitrary code remotely. This affects organizations using vulnerable versions of SolarWinds ARM. Attackers could gain full control of affected systems.
💻 Affected Systems
- SolarWinds Access Rights Manager
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise leading to data theft, lateral movement, and persistent backdoor installation across the network.
Likely Case
Privilege escalation leading to domain admin access, credential harvesting, and deployment of ransomware or other malware.
If Mitigated
Limited impact if proper network segmentation, least privilege, and monitoring are in place.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward once credentials are obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2024.1 or later
Vendor Advisory: https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-23478
Restart Required: Yes
Instructions:
1. Download SolarWinds ARM 2024.1 or later from the SolarWinds customer portal. 2. Backup current configuration. 3. Run the installer with administrative privileges. 4. Restart the SolarWinds ARM service.
🔧 Temporary Workarounds
Restrict Network Access
allLimit access to SolarWinds ARM interface to trusted IP addresses only.
Configure firewall rules to restrict access to SolarWinds ARM ports (default 17778)
Enforce Strong Authentication
allImplement multi-factor authentication and strong password policies for all SolarWinds ARM accounts.
🧯 If You Can't Patch
- Isolate SolarWinds ARM server in a dedicated VLAN with strict network segmentation
- Implement application allowlisting to prevent unauthorized code execution
🔍 How to Verify
Check if Vulnerable:
Check SolarWinds ARM version in the web interface under Help > About.
Check Version:
Check web interface or registry key: HKEY_LOCAL_MACHINE\SOFTWARE\SolarWinds\Access Rights Manager\Version
Verify Fix Applied:
Verify version is 2024.1 or later and check for successful patch installation logs.
📡 Detection & Monitoring
Log Indicators:
- Unusual process creation from SolarWinds ARM service
- Failed authentication attempts followed by successful login
- Unusual network connections from ARM server
Network Indicators:
- Outbound connections from ARM server to unusual destinations
- Unusual port activity on ARM server
SIEM Query:
source="solarwinds-arm" AND (event_type="process_creation" OR event_type="network_connection")