First published: Thu Sep 12 2024(Updated: )
SolarWinds Access Rights Manager (ARM) was found to contain a hard-coded credential authentication bypass vulnerability. If exploited, this vulnerability would allow access to the RabbitMQ management console. We thank Trend Micro Zero Day Initiative (ZDI) for its ongoing partnership in coordinating with SolarWinds on responsible disclosure of this and other potential vulnerabilities.
Credit: psirt@solarwinds.com
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds Access Rights Manager | <2024.3.1 |
SolarWinds recommends that customers upgrade to SolarWinds Access Rights Manager (ARM) 2024.3.1 SR as soon as it becomes available.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28990 is considered a critical vulnerability due to its potential to enable unauthorized access to sensitive components.
To fix CVE-2024-28990, it is recommended to update SolarWinds Access Rights Manager to version 2024.3.1 or later.
The risks associated with CVE-2024-28990 include unauthorized access to the RabbitMQ management console, potentially leading to data breaches.
CVE-2024-28990 affects users of SolarWinds Access Rights Manager versions prior to 2024.3.1.
CVE-2024-28990 specifically impacts the authentication mechanism used in SolarWinds Access Rights Manager.