By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: SolarWinds fixes 8 critical bugs in access rights audit software
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > SolarWinds fixes 8 critical bugs in access rights audit software
Tech News

SolarWinds fixes 8 critical bugs in access rights audit software

By admin 4 Min Read
Share
SHARE

SolarWinds has fixed eight critical vulnerabilities in its Access Rights Manager (ARM) software, six of which allowed attackers to gain remote code execution (RCE) on vulnerable devices.

Access Rights Manager is a critical tool in enterprise environments that helps admins manage and audit access rights across their organization’s IT infrastructure to minimize threat impact.

The RCE vulnerabilities (CVE-2024-23469, CVE-2024-23466, CVE-2024-23467, CVE-2024-28074, CVE-2024-23471, and CVE-2024-23470)—all rated with 9.6/10 severity scores—let attackers without privileges perform actions on unpatched systems by executing code or commands, with or without SYSTEM privileges depending on the exploited flaw.

The company also patched three critical directory traversal flaws (CVE-2024-23475 and CVE-2024-23472) that allow unauthenticated users to perform arbitrary file deletion and obtain sensitive information after accessing files or folders outside of restricted directories.

It also fixed a high-severity authentication bypass vulnerability (CVE-2024-23465) that can let unauthenticated malicious actors gain domain admin access within the Active Directory environment.

SolarWinds patched the flaws (all reported through Trend Micro’s Zero Day Initiative) in Access Rights Manager 2024.3, released on Wednesday with bug and security fixes.

The company has yet to reveal whether proof-of-concept exploits for these flaws are available in the wild or whether any of them have been exploited in attacks.

CVE-ID Vulnerability Title
CVE-2024-23469 SolarWinds ARM Exposed Dangerous Method Remote Code Execution
CVE-2024-23466 SolarWinds ARM Directory Traversal Remote Code Execution Vulnerability
CVE-2024-23467 SolarWinds ARM Directory Traversal Remote Code Execution Vulnerability
CVE-2024-28074 SolarWinds ARM Internal Deserialization Remote Code Execution Vulnerability
CVE-2024-23471 SolarWinds ARM CreateFile Directory Traversal Remote Code Execution Vulnerability
CVE-2024-23470 SolarWinds ARM UserScriptHumster Exposed Dangerous Method RCE Vulnerability
CVE-2024-23475 SolarWinds ARM Directory Traversal and Information Disclosure Vulnerability
CVE-2024-23472 SolarWinds ARM Directory Traversal Arbitrary File Deletion and Information Disclosure
CVE-2024-23465 SolarWinds ARM ChangeHumster Exposed Dangerous Method Authentication Bypass

In February, the company patched five other RCE vulnerabilities in the Access Rights Manager (ARM) solution, three of which were rated critical because they allowed unauthenticated exploitation.

Four years ago, SolarWinds’ internal systems were breached by the Russian APT29 hacking group. The threat group injected malicious code into Orion IT administration platform builds downloaded by customers between March 2020 and June 2020.

With over 300,000 customers worldwide at the time, SolarWinds serviced 96% of Fortune 500 companies, including high-profile tech companies like Apple, Google, and Amazon, and government organizations like the U.S. Military, Pentagon, State Department, NASA, NSA, Postal Service, NOAA, Department of Justice, and the Office of the President of the United States.

However, even though the Russian state hackers used the trojanized updates to deploy the Sunburst backdoor on thousands of systems, they only targeted a significantly smaller number of Solarwinds customers for further exploitation.

After the supply-chain attack was disclosed, multiple U.S. government agencies confirmed their networks were breached in the campaign. These included the Departments of State, Homeland Security, Treasury, and Energy, as well as the National Telecommunications and Information Administration (NTIA), the National Institutes of Health, and the National Nuclear Security Administration.

In April 2021, the U.S. government formally accused the Russian Foreign Intelligence Service (SVR) of orchestrating the 2020 Solarwinds attack, and the U.S. Securities and Exchange Commission (SEC) charged SolarWinds in October 2023 for failing to notify investors of cybersecurity defense issues before the hack.


You Might Also Like

Top 3 leadership myths debunked

Adds Device Fingerprinting, PNG Steganography Payloads

Your Delivery Robot Is Here

Samsung Galaxy Tab S11 Review: It’s Time For Something New

How the World’s Largest 3D Object Library By Microsoft & NVIDIA

TAGGED: Authentication Bypass, RCE, Remote Code Execution, solarwinds, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article Ursula von der Leyen re-elected as European Commission president
Next Article JBL Modern Audio (MA) AV Receivers Unveiled
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Patricia Routledge Net Worth: How Much Money the ‘Keeping Up With Appearances’ Star Had
Celebrity
Ghost of Yōtei’s Open World is a Cut Above Its Competition
Gaming News
The best guns in the Black Ops 7 beta in early access
Gaming News
6-story office building to be converted into housing in Denver’s Capitol Hill
Business
Could Trump’s $2,000 tariff rebates for Americans stimulate an altcoin surge?
Crypto
Hegseth announces latest strike on boat near Venezuela he says was trafficking drugs
World News
Top 3 leadership myths debunked
Tech News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Patricia Routledge Net Worth: How Much Money the ‘Keeping Up With Appearances’ Star Had

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Patricia Routledge Net Worth: How Much Money the ‘Keeping Up With Appearances’ Star Had
October 3, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?