SolarWinds Just Patched a Bunch of Critical Security Vulnerabilities
SolarWinds has fixed more than a dozen bugs affecting its Access Rights Manager (ARM) software.
Some vulnerabilities are classified as critical and can be exploited to steal sensitive information or execute malicious code on vulnerable endpoints.
Users are therefore advised to implement the solutions as soon as possible and secure their devices.
Update now
In a security advisory published earlier this week, the company described 13 vulnerabilities affecting its software, eight of which are marked as “critical.”
Here’s a quick summary:
Information Traversal and Disclosure Vulnerability (CVE-2024-23475, 9.6 Critical)
Directory Traversal Arbitrary File Deletion and Information Disclosure Vulnerability (CVE-2024-23472, 9.6 Critical)
Internal Deserialization Remote Code Execution Vulnerability (CVE-2024-28074, 9.6 Critical)
Exposed Dangerous Method Remote Code Execution Vulnerability (CVE-2024-23469, 9.6 Critical)
Remote Code Execution Vulnerability via Traversal (CVE-2024-23467, 9.6 Critical)
Directory Traversal Remote Code Execution Vulnerability (CVE-2024-23466, 9.6 Critical)
UserScriptHumster has exposed a vulnerability that could detect dangerous remote command execution methods (CVE-2024-23470, 9.6 Critical)
Remote Code Execution Vulnerability in CreateFile Directory Traversal (CVE-2024-23471, 9.6 Critical).
These vulnerabilities, and five others (severity scores ranging from 7.6 to 8.3), were discovered and reported by Trend Micro’s Zero Day Initiative (ZDI). They were addressed in version 2024.3, published on July 17, 2024.
SolarWinds specializes in IT management software, offering products for network monitoring, server and application monitoring, IT security, database management, and IT help desk and support.
The company was at the center of a major security incident in December 2020, when a breach of the company’s IT infrastructure resulted in a poisoned software update for Orion reaching hundreds of customers. The incident is now considered one of the largest and most devastating supply chain attacks in history.