First published: Thu Sep 12 2024(Updated: )
SolarWinds Access Rights Manager (ARM) was found to be susceptible to a remote code execution vulnerability. If exploited, this vulnerability would allow an authenticated user to abuse the service, resulting in remote code execution.
Credit: psirt@solarwinds.com
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds Access Rights Manager | <2024.3.1 |
All SolarWinds customers are advised to upgrade to the latest version of the SolarWinds Access Rights Manager (ARM) 2024.3.1 SR
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28991 is classified as a critical vulnerability due to its potential for remote code execution.
To mitigate CVE-2024-28991, upgrade SolarWinds Access Rights Manager to version 2024.3.1 or later.
CVE-2024-28991 affects authenticated users of SolarWinds Access Rights Manager prior to version 2024.3.1.
If exploited, CVE-2024-28991 allows an authenticated user to execute arbitrary code on the server.
Currently, the recommended approach to address CVE-2024-28991 is to apply the security update rather than relying on a workaround.