CVE-2024-28990

6.3 MEDIUM

📋 TL;DR

SolarWinds Access Rights Manager (ARM) contains hard-coded credentials that allow authentication bypass to the RabbitMQ management console. This vulnerability affects all SolarWinds ARM installations using vulnerable versions. Attackers could gain unauthorized access to message queue management functions.

💻 Affected Systems

Products:
  • SolarWinds Access Rights Manager
Versions: Versions prior to 2024.3.1
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all ARM installations with RabbitMQ component enabled. The vulnerability is in the hard-coded credentials used for RabbitMQ management interface authentication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of RabbitMQ management console leading to message queue manipulation, data exposure, and potential lateral movement within the network.

🟠

Likely Case

Unauthorized access to RabbitMQ console allowing viewing of sensitive message data and potential disruption of messaging services.

🟢

If Mitigated

Limited impact if RabbitMQ console is isolated from sensitive systems and monitored for unauthorized access.

🌐 Internet-Facing: HIGH if RabbitMQ management console is exposed to internet, as authentication bypass allows direct access.
🏢 Internal Only: MEDIUM as internal attackers or compromised systems could exploit this to access RabbitMQ management functions.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires knowledge of the hard-coded credentials and access to the RabbitMQ management interface. No authentication needed once credentials are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.3.1

Vendor Advisory: https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-28990

Restart Required: Yes

Instructions:

1. Download SolarWinds ARM 2024.3.1 from SolarWinds Customer Portal. 2. Run the installer with administrative privileges. 3. Follow the upgrade wizard. 4. Restart ARM services after installation completes.

🔧 Temporary Workarounds

Restrict RabbitMQ Management Console Access

windows

Block network access to RabbitMQ management console port (default 15672) using firewall rules.

netsh advfirewall firewall add rule name="Block RabbitMQ Console" dir=in action=block protocol=TCP localport=15672

Change RabbitMQ Credentials

linux

Manually change RabbitMQ credentials if unable to patch immediately.

rabbitmqctl change_password guest new_secure_password

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate RabbitMQ management console from untrusted networks
  • Enable detailed logging and monitoring for RabbitMQ management console access attempts

🔍 How to Verify

Check if Vulnerable:

Check ARM version in SolarWinds ARM web interface under Help > About. If version is earlier than 2024.3.1, system is vulnerable.

Check Version:

Not applicable - check via ARM web interface

Verify Fix Applied:

After upgrading to 2024.3.1, verify version in Help > About shows 2024.3.1 or later. Test that hard-coded credentials no longer work for RabbitMQ console access.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts to RabbitMQ console using default credentials
  • Successful logins to RabbitMQ console from unexpected IP addresses

Network Indicators:

  • TCP connections to port 15672 from unauthorized sources
  • HTTP requests to /api/ endpoints on RabbitMQ management port

SIEM Query:

source="rabbitmq.log" AND (event="authentication failure" OR event="login succeeded")

🔗 References

📤 Share & Export