By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: SolarWinds fixes 8 critical bugs in access rights audit software
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > SolarWinds fixes 8 critical bugs in access rights audit software
Tech News

SolarWinds fixes 8 critical bugs in access rights audit software

By admin 4 Min Read
Share
SHARE

SolarWinds has fixed eight critical vulnerabilities in its Access Rights Manager (ARM) software, six of which allowed attackers to gain remote code execution (RCE) on vulnerable devices.

Access Rights Manager is a critical tool in enterprise environments that helps admins manage and audit access rights across their organization’s IT infrastructure to minimize threat impact.

The RCE vulnerabilities (CVE-2024-23469, CVE-2024-23466, CVE-2024-23467, CVE-2024-28074, CVE-2024-23471, and CVE-2024-23470)—all rated with 9.6/10 severity scores—let attackers without privileges perform actions on unpatched systems by executing code or commands, with or without SYSTEM privileges depending on the exploited flaw.

The company also patched three critical directory traversal flaws (CVE-2024-23475 and CVE-2024-23472) that allow unauthenticated users to perform arbitrary file deletion and obtain sensitive information after accessing files or folders outside of restricted directories.

It also fixed a high-severity authentication bypass vulnerability (CVE-2024-23465) that can let unauthenticated malicious actors gain domain admin access within the Active Directory environment.

SolarWinds patched the flaws (all reported through Trend Micro’s Zero Day Initiative) in Access Rights Manager 2024.3, released on Wednesday with bug and security fixes.

The company has yet to reveal whether proof-of-concept exploits for these flaws are available in the wild or whether any of them have been exploited in attacks.

CVE-ID Vulnerability Title
CVE-2024-23469 SolarWinds ARM Exposed Dangerous Method Remote Code Execution
CVE-2024-23466 SolarWinds ARM Directory Traversal Remote Code Execution Vulnerability
CVE-2024-23467 SolarWinds ARM Directory Traversal Remote Code Execution Vulnerability
CVE-2024-28074 SolarWinds ARM Internal Deserialization Remote Code Execution Vulnerability
CVE-2024-23471 SolarWinds ARM CreateFile Directory Traversal Remote Code Execution Vulnerability
CVE-2024-23470 SolarWinds ARM UserScriptHumster Exposed Dangerous Method RCE Vulnerability
CVE-2024-23475 SolarWinds ARM Directory Traversal and Information Disclosure Vulnerability
CVE-2024-23472 SolarWinds ARM Directory Traversal Arbitrary File Deletion and Information Disclosure
CVE-2024-23465 SolarWinds ARM ChangeHumster Exposed Dangerous Method Authentication Bypass

In February, the company patched five other RCE vulnerabilities in the Access Rights Manager (ARM) solution, three of which were rated critical because they allowed unauthenticated exploitation.

Four years ago, SolarWinds’ internal systems were breached by the Russian APT29 hacking group. The threat group injected malicious code into Orion IT administration platform builds downloaded by customers between March 2020 and June 2020.

With over 300,000 customers worldwide at the time, SolarWinds serviced 96% of Fortune 500 companies, including high-profile tech companies like Apple, Google, and Amazon, and government organizations like the U.S. Military, Pentagon, State Department, NASA, NSA, Postal Service, NOAA, Department of Justice, and the Office of the President of the United States.

However, even though the Russian state hackers used the trojanized updates to deploy the Sunburst backdoor on thousands of systems, they only targeted a significantly smaller number of Solarwinds customers for further exploitation.

After the supply-chain attack was disclosed, multiple U.S. government agencies confirmed their networks were breached in the campaign. These included the Departments of State, Homeland Security, Treasury, and Energy, as well as the National Telecommunications and Information Administration (NTIA), the National Institutes of Health, and the National Nuclear Security Administration.

In April 2021, the U.S. government formally accused the Russian Foreign Intelligence Service (SVR) of orchestrating the 2020 Solarwinds attack, and the U.S. Securities and Exchange Commission (SEC) charged SolarWinds in October 2023 for failing to notify investors of cybersecurity defense issues before the hack.


You Might Also Like

Geotab Strengthens Global Footprint and Small to Mid-Sized Fleet Solutions with Acquisition of Verizon Connect’s International Commercial Operations in Europe and Australia

Our Favorite All-in-One Printer and Scanner Is $50 Off

Four Dublin start-ups awarded at 2025 New Frontiers showcase

Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware

Gemini AI Coming to Older Google Nest Speakers, Cameras, and Doorbells

TAGGED: Authentication Bypass, RCE, Remote Code Execution, solarwinds, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article Ursula von der Leyen re-elected as European Commission president
Next Article JBL Modern Audio (MA) AV Receivers Unveiled
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

The 15 Best Abilities In Final Fantasy Tactics And It’s Not Close
Gaming News
Geotab Strengthens Global Footprint and Small to Mid-Sized Fleet Solutions with Acquisition of Verizon Connect’s International Commercial Operations in Europe and Australia
Tech News
‘I don’t know why I need to go to college’: Ford CEO says his Gen Z son worked as a mechanic and wondered if the 4-year degree was still worth it
Business
Ethereum Foundation Unveils Next Phase Of Its Privacy Revolution
Crypto
Eiffel Tower closed as nationwide strikes held across France against spending cuts
World News
Dragon Ball: Sparking! ZERO Celebrates Over 200 Characters, Teases News of More in 2026
Gaming News
Developer sues Westminster, blames Xcel delays for stalled apartment project
Business

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

The 15 Best Abilities In Final Fantasy Tactics And It’s Not Close

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
The 15 Best Abilities In Final Fantasy Tactics And It’s Not Close
October 3, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?