SolarWinds ARM Has a Hard-Coded Credential Bypass Vulnerability
CVE-2024-28990
9.8CRITICAL
Summary
The SolarWinds Access Rights Manager (ARM) is affected by a serious authentication bypass due to the presence of hard-coded credentials. Exploiting this vulnerability could allow an attacker to gain unauthorized access to the RabbitMQ management console, potentially compromising sensitive data and system configurations. This flaw emphasizes the importance of strong authentication measures and regular security assessments in application management. SolarWinds acknowledges the issue and collaborates with security experts to mitigate such vulnerabilities promptly.
Affected Version(s)
Access Rights Manager previous versions <= 2024.3
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative