SolarWinds ARM Vulnerable to Directory Traversal Remote Code Execution
CVE-2024-23477

7.9HIGH

Key Information:

Vendor
Solarwinds
Vendor
CVE Published:
15 February 2024

Summary

The SolarWinds Access Rights Manager (ARM) is susceptible to a directory traversal vulnerability that facilitates remote code execution without authentication. By exploiting this vulnerability, an attacker can manipulate file paths to access restricted directories and execute arbitrary code on the server. This poses significant risks to the integrity and confidentiality of the system, allowing unauthorized users to gain control and potentially disrupt operations.

Affected Version(s)

Access Rights Manager previous versions <= 2023.2.2

References

CVSS V3.1

Score:
7.9
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Anonymous working with Trend Micro Zero Day Initiative
.