--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies title: 'Critical Vulnerabilities in SolarWinds Access Rights Manager' number: '2024-071' version: '1.0' original_date: 'July 18, 2024' date: 'July 19, 2024' --- _History:_ * _19/07/2024 --- v1.0 -- Initial publication_ # Summary On July 18, 2024, SolarWinds issued an advisory addressing multiple critical vulnerabilities in its Access Rights Manager (ARM) software [1,2]. These vulnerabilities could lead to remote code execution, arbitrary file deletion and sensitive information leakage. It is recommended updating affected systems immediately. # Technical Details The vulnerabilities **CVE-2024-23469**, **CVE-2024-23466**, **CVE-2024-23467**, **CVE-2024-28074**, **CVE-2024-23471**, and **CVE-2024-23470**, all with a CVSS score of 9.6, could lead to remote code execution if exploited. They are due to various critical flaws. The vulnerabilities **CVE-2024-23475**, and **CVE-2024-23472**, both with a CVSS score of 9.6, are directory traversal and sensitive information disclosure flaws. The vulnerability **CVE-2024-23465**, with a CVSS score of 8.3, is an authentication bypass vulnerability. # Affected Products - SolarWinds Access Rights Manager versions prior to 2024.3. # Recommendations CERT-EU recommends updating affected devices to the latest version of SolarWinds Access Rights Manager as soon as possible. # References [1] [2]