CVE-2024-28991

9.0 CRITICAL

📋 TL;DR

SolarWinds Access Rights Manager (ARM) contains a deserialization vulnerability (CWE-502) that allows authenticated users to execute arbitrary code remotely. This affects organizations using vulnerable versions of SolarWinds ARM. Attackers could gain full control of affected systems.

💻 Affected Systems

Products:
  • SolarWinds Access Rights Manager
Versions: Versions prior to 2024.3.1
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the ARM web interface. All deployments with vulnerable versions are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install malware, steal credentials, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Attackers gain administrative privileges on the ARM server, potentially accessing sensitive Active Directory information and using it for lateral movement.

🟢

If Mitigated

Limited impact if proper network segmentation, authentication controls, and monitoring are in place to detect exploitation attempts.

🌐 Internet-Facing: HIGH if ARM is exposed to the internet, as authenticated attackers could exploit it remotely.
🏢 Internal Only: HIGH as authenticated internal users or compromised accounts could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access but exploitation appears straightforward once authentication is obtained. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.3.1

Vendor Advisory: https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-28991

Restart Required: Yes

Instructions:

1. Download SolarWinds ARM 2024.3.1 from the SolarWinds customer portal. 2. Backup current configuration and database. 3. Run the installer with administrative privileges. 4. Restart the ARM service and verify functionality.

🔧 Temporary Workarounds

Restrict Network Access

all

Limit access to ARM web interface to only trusted administrative networks

Configure firewall rules to restrict access to ARM ports (default 17778)

Enforce Strong Authentication

windows

Implement multi-factor authentication and strong password policies for ARM accounts

Enable MFA in ARM settings and enforce complex passwords

🧯 If You Can't Patch

  • Isolate ARM server in a dedicated network segment with strict access controls
  • Implement application allowlisting to prevent execution of unauthorized binaries

🔍 How to Verify

Check if Vulnerable:

Check ARM version in web interface under Help > About or via Windows Programs and Features

Check Version:

Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Access Rights Manager*'} | Select-Object Name, Version

Verify Fix Applied:

Verify version shows 2024.3.1 or later and test ARM functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from ARM service
  • Suspicious network connections from ARM server
  • Failed authentication attempts followed by successful login

Network Indicators:

  • Unusual outbound connections from ARM server
  • Traffic to suspicious IPs/domains from ARM server

SIEM Query:

source="ARM_Logs" AND (event_type="process_creation" AND process_name NOT IN ("arm_service.exe", "normal_processes")) OR (event_type="network_connection" AND dest_ip NOT IN ("trusted_ips"))

🔗 References

📤 Share & Export