CVE-2024-28075

9.0 CRITICAL

📋 TL;DR

This vulnerability allows authenticated users of SolarWinds Access Rights Manager to execute arbitrary code remotely on affected systems. Attackers with valid credentials can exploit this deserialization flaw to gain full control of the ARM server. Organizations running vulnerable versions of SolarWinds ARM are affected.

💻 Affected Systems

Products:
  • SolarWinds Access Rights Manager
Versions: Versions prior to 2023.2.4
Operating Systems: Windows Server (where ARM is typically deployed)
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable; requires authentication but no special privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the ARM server leading to domain privilege escalation, lateral movement, and data exfiltration.

🟠

Likely Case

Authenticated attackers gaining SYSTEM/root privileges on the ARM server, enabling credential theft and persistence.

🟢

If Mitigated

Limited to authenticated users only; proper network segmentation and authentication controls reduce blast radius.

🌐 Internet-Facing: HIGH if ARM is exposed to internet; attackers can exploit after credential compromise or brute force.
🏢 Internal Only: HIGH due to authenticated exploitation; insider threats or compromised credentials can lead to full system compromise.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication but is straightforward once credentials are obtained; likely to be weaponized given high CVSS score.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2023.2.4 or later

Vendor Advisory: https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-28075

Restart Required: Yes

Instructions:

1. Download ARM 2023.2.4 or later from SolarWinds Customer Portal. 2. Backup current configuration. 3. Run installer with administrative privileges. 4. Restart ARM services as prompted.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to ARM server to only trusted administrative networks.

Enhanced Authentication Controls

all

Implement multi-factor authentication and strong password policies for ARM users.

🧯 If You Can't Patch

  • Isolate ARM server in dedicated VLAN with strict firewall rules allowing only necessary traffic.
  • Implement application allowlisting to prevent execution of unauthorized binaries on ARM server.

🔍 How to Verify

Check if Vulnerable:

Check ARM version in web interface (Admin → About) or via registry: HKEY_LOCAL_MACHINE\SOFTWARE\SolarWinds\ARM\Version.

Check Version:

reg query "HKLM\SOFTWARE\SolarWinds\ARM" /v Version

Verify Fix Applied:

Confirm version is 2023.2.4 or higher and test authenticated functionality remains operational.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from ARM service account
  • Failed authentication attempts followed by successful login and suspicious activity

Network Indicators:

  • Unexpected outbound connections from ARM server
  • Anomalous traffic patterns to/from ARM ports (typically 17778)

SIEM Query:

source="arm_logs" AND (event_type="process_creation" AND parent_process="SolarWinds.ARM.Service") OR (auth_failure AND auth_success AND src_ip=same_ip_within_short_time)

🔗 References

📤 Share & Export