SolarWinds ARM RCE via Authenticated Service Abuse
CVE-2024-28075 Published on May 14, 2024
SolarWinds ARM Deserialization of Untrusted Data Remote Code Execution
The SolarWinds Access Rights Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows an authenticated user to abuse SolarWinds service resulting in remote code execution.
We thank Trend Micro Zero Day Initiative (ZDI) for its ongoing partnership in coordinating with SolarWinds on responsible disclosure of this and other potential vulnerabilities.
Vulnerability Analysis
Weakness Type
What is a Marshaling, Unmarshaling Vulnerability?
The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.
CVE-2024-28075 has been classified to as a Marshaling, Unmarshaling vulnerability or weakness.
Products Associated with CVE-2024-28075
Want to know whenever a new CVE is published for SolarWinds Access Rights Manager? stack.watch will email you.
Affected Versions
SolarWinds Access Rights Manager:- Version previous versions, <= 2023.2.3 is affected.
- Before 2023.2.4 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.