First published: Thu May 09 2024(Updated: )
The SolarWinds Access Rights Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows an authenticated user to abuse SolarWinds service resulting in remote code execution. We thank Trend Micro Zero Day Initiative (ZDI) for its ongoing partnership in coordinating with SolarWinds on responsible disclosure of this and other potential vulnerabilities.
Credit: psirt@solarwinds.com
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds Access Rights Manager | ||
<2023.2.4 |
All SolarWinds Access Rights Manager customers are advised to upgrade to the latest version of the SolarWinds Access Rights Manager 2023.2.4
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28075 is considered a critical vulnerability due to its potential for remote code execution.
To fix CVE-2024-28075, ensure that you update your SolarWinds Access Rights Manager to the latest patched version.
CVE-2024-28075 can be exploited by an authenticated user of SolarWinds Access Rights Manager.
CVE-2024-28075 is classified as a Remote Code Execution (RCE) vulnerability.
The impact of CVE-2024-28075 may allow unauthorized execution of code, potentially compromising system integrity.