First published: Thu May 09 2024(Updated: )
The SolarWinds Access Rights Manager was found to contain a hard-coded credential authentication bypass vulnerability. If exploited, this vulnerability allows access to the RabbitMQ management console. We thank Trend Micro Zero Day Initiative (ZDI) for its ongoing partnership in coordinating with SolarWinds on responsible disclosure of this and other potential vulnerabilities.
Credit: psirt@solarwinds.com
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds Access Rights Manager | ||
SolarWinds Access Rights Manager | <2023.2.4 |
All SolarWinds Access Rights Manager customers are advised to upgrade to the latest version of the SolarWinds Access Rights Manager 2023.2.4
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23473 is considered a critical vulnerability due to its potential to allow unauthorized access to sensitive components.
To mitigate CVE-2024-23473, it is recommended to upgrade the SolarWinds Access Rights Manager to the latest version.
CVE-2024-23473 specifically affects the SolarWinds Access Rights Manager versions prior to 2023.2.4.
CVE-2024-23473 is a hard-coded credential authentication bypass vulnerability.
Exploiting CVE-2024-23473 could allow attackers to gain unauthorized access to the RabbitMQ management console.