SolarWinds ARM Vulnerable to Directory Traversal Remote Code Execution
CVE-2024-23477
7.9HIGH
Summary
The SolarWinds Access Rights Manager (ARM) is susceptible to a directory traversal vulnerability that facilitates remote code execution without authentication. By exploiting this vulnerability, an attacker can manipulate file paths to access restricted directories and execute arbitrary code on the server. This poses significant risks to the integrity and confidentiality of the system, allowing unauthorized users to gain control and potentially disrupt operations.
Affected Version(s)
Access Rights Manager previous versions <= 2023.2.2
References
CVSS V3.1
Score:
7.9
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Anonymous working with Trend Micro Zero Day Initiative