SolarWinds Access Rights Manager RCE via Authenticated Service Abuse
CVE-2024-23471 Published on July 17, 2024

SolarWinds Access Rights Manager (ARM) CreateFile Directory Traversal Remote Code Execution Vulnerability
The SolarWinds Access Rights Manager was found to be susceptible to a Remote Code Execution Vulnerability. If exploited, this vulnerability allows an authenticated user to abuse a SolarWinds service resulting in remote code execution.

NVD

Vulnerability Analysis

Attack Vector:
ADJACENT_NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
NONE
Scope:
CHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
HIGH

Weakness Type

What is an authentification Vulnerability?

When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.

CVE-2024-23471 has been classified to as an authentification vulnerability or weakness.


Products Associated with CVE-2024-23471

Want to know whenever a new CVE is published for SolarWinds Access Rights Manager? stack.watch will email you.

 

Affected Versions

SolarWinds Access Rights Manager: solarwinds access_rights_manager:

Exploit Probability

EPSS
1.59%
Percentile
81.58%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.