Friday, October 31, 2025
Email Us
Info Security Watch
No Result
View All Result
Info Security Watch
No Result
View All Result
Home Vulnerability Alert

SolarWinds ARM Vulnerability Lets Attackers Bypass Authentication & Execute Remote Code

Administrator by Administrator
September 13, 2024
in Vulnerability Alert, IT Management, News, Cybersecurity
387 12
0
Learn about the critical SolarWinds ARM vulnerabilities, CVE-2024-28990 and CVE-2024-28991, that allow attackers to bypass authentication and execute remote code. Apply updates now to secure your system

Learn about the critical SolarWinds ARM vulnerabilities, CVE-2024-28990 and CVE-2024-28991, that allow attackers to bypass authentication and execute remote code. Apply updates now to secure your system

549
SHARES
2.5k
VIEWS
Share on FacebookShare on Twitter

SolarWinds ARM Vulnerability

SolarWinds, a leading provider of IT management software, recently disclosed critical vulnerabilities in its Access Rights Manager (ARM) platform. Identified as CVE-2024-28990 and CVE-2024-28991, these vulnerabilities allow attackers to bypass authentication and execute remote code, posing significant security risks.

The company has released a service update, Access Rights Manager 2024.3.1, to address these critical issues.


Understanding the Vulnerabilities

CVE-2024-28990 and CVE-2024-28991 have been assigned the following severity ratings:

CVE-IDVulnerability TitleDescriptionSeverity
CVE-2024-28990SolarWinds ARM Hardcoded Credentials Authentication Bypass VulnerabilityFound to contain a hard-coded credential authentication bypass vulnerability, allowing access to RabbitMQ console.6.3 Medium
CVE-2024-28991SolarWinds ARM Deserialization of Untrusted Data Remote Code ExecutionSusceptible to remote code execution, allowing authenticated users to exploit the service and execute code remotely.9.0 Critical

These vulnerabilities were responsibly disclosed by Piotr Bazydlo of the Trend Micro Zero Day Initiative, underscoring the importance of collaboration between security researchers and companies.


Fixes and Updates

SolarWinds responded swiftly by releasing Access Rights Manager 2024.3.1, addressing these vulnerabilities along with several bug fixes to enhance platform security and functionality.

Key fixes in the 2024.3.1 update include:

Case Number(s)Description
01443343, 01572081The Accounts screen now correctly displays account information when adding or deleting multiple accounts from a SharePoint group.
01719845GrantMA workflows now display in the Workflows tab after restarting the ARM Service.
01721548, 01736092The Connection tab in the Settings menu is now accessible.
01721505, 01721609ARM server hostnames containing numbers no longer break the connection between the ARM server and collector.
01331492, 01677939Exception messages no longer display after updating the ARM server to version 2024.3.

Recommendations

Organizations using SolarWinds ARM should apply the 2024.3.1 update immediately to mitigate the risks associated with these vulnerabilities.

SolarWinds has also provided guidance on resolving known issues during the update process. One known issue is a configwizard error when the ARM server fails to restart automatically after the update. The suggested workaround is to manually restart the ARM service. If the issue persists, users should delete the pnServer.messaging.config.xml file and restart the service again.

Tags: SolarWindsCVE-2024-28990CVE-2024-28991Access Rights ManagerRemote Code ExecutionIT Management SoftwareCybersecurityVulnerabilities
Advertisement Banner
No Result
View All Result

Trending

Internet Security, Zero Trust, Multi-Factor Authentication, Real-Time Threat Intelligence, AI in Cybersecurity, Market Report
Internet Security

Internet Security Strategic Business Report 2023-2030

September 11, 2024
BreachSeek, AI Penetration Testing, Cybersecurity, LangChain, LangGraph, LLMs, Vulnerability Testing, KFUPM
Tools

BreachSeek: AI-Based Automated Multi-Platform Penetration Testing Tool

September 10, 2024
Endpoint Privilege Management, PAM, CISOs, Cybersecurity, ThreatLocker, Administrative Privileges, Insider Threats
Insider Threats

Navigating Endpoint Privilege Management

September 11, 2024
Hussein Syed, RWJBarnabas Health, CISO, Cybersecurity, Healthcare Security, Becker’s Hospital Review Healthcare Cybersecurity, Industry Recognition, Leadership
Industry Recognition

Hussein Syed, RWJ Barnabas Health CISO, Honored as One of 54 CISOs To Know Nationwide

September 10, 2024
Cybersecurity, Government Cybersecurity, AI, Zero Trust, Cyber Hygiene, Global Cybercrime, Cybersecurity Strategy Categories: Cybersecurity News, Government Cybersecurity, Global Threats
Cyber Defense

Governments Urged to Get Back to Basics to Stay Ahead of Cybersecurity Threats

September 10, 2024
Terrorist Organizations Exploit Financial Systems for Funding
Financial Crimes

Terrorist Organizations Exploit Financial Systems for Funding

September 8, 2024
Info Security Watch

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

Follow Us

Recent News

Cyware Achieves FedRAMP Ready Status to Enhance Cybersecurity

Cyware Achieves FedRAMP Ready Status to Enhance Cybersecurity

November 14, 2024
Computer Security Market Advancements Highlighted by Key Drivers and Innovations: Strategic Insights and Forecasts to 2031

Computer Security Market Key Drivers, Innovations, and Forecasts to 2031

September 18, 2024
New York, United States of America
Friday, October 31, 2025
Partly cloudy
11 ° c
14 c 8 c
Sat
14 c 8 c
Sun
  • About
  • Terms of Service
  • Affiliate Disclosure
  • Disclaimer
  • Contact Us

© 2024 Info Security Watch. All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Information Security
  • Cybersecurity
    • Intrusion Detection & Prevention Systems (IDPS)
    • Data Loss Prevention (DLP)
    • Threat Hunting
    • Secure Remote Access
    • Data Centre Security
    • Cybersecurity Architecture Design
    • Behavioral Analytics
    • Mobile Security
    • Wireless Network Security
    • Privileged Access Management (PAM)
  • OSINT (Open Source Intelligence)
    • OSINT Techniques
    • Sentiment Analysis
    • Image & Video Analysis
    • OSINT for Financial Crime
    • Automated Threat Intelligence Platforms
    • Human Intelligence (HUMINT) Integration
    • Cybercrime Investigation
    • Geolocation Intelligence
    • Metadata Analysis
    • OSINT in Crisis Response
    • Counterterrorism OSINT
  • Digital Forensics
    • Database Forensics
    • Malware Forensics
    • Video Forensics
    • Audio Forensics
    • Anti-Forensics Techniques
    • Forensic Report Writing
    • Cross-Border Digital Investigations
    • Cryptocurrency Forensics
    • Digital Evidence Preservation
    • Legal and Regulatory Forensics
  • Cybersecurity Compliance & Risk Management
    • Compliance
    • Cyber Risk Quantification
  • Financial Analysis
    • Financial Crimes
    • Financial Systems
    • Financial Security
    • Offshore Accounts
    • Shell Companies
    • Terrorist Financing
    • Money Laundering
    • Fraud Detection
  • Business
  • Blockchain
    • Cryptocurrency
  • Investigations
    • Corporate Investigation
    • Investigation Tools
    • Investigative Journalism
  • Data Privacy
    • Data Protection,
  • Intelligence Gathering
    • Data Gathering
  • Dark Web
  • Global Security
    • Cyber Defense
  • Threat Intelligence
    • Cyber Risk Quantification
    • Social Media
    • Report
    • Supply Chain Security
    • Threat Detection
  • Defense
    • Offshore
  • Privacy Policy
  • Framework
    • Government
    • Illicit Funds
    • IoT Security
  • Networking
  • Public Records
  • Ransomware
    • Ransomware Attacks
  • Vulnerabilities
  • Tools
  • Enterprise
  • Artificial Intelligence
  • Quantum Computing
  • Zero-Day
  • Disclaimer
  • Affiliate Disclosure
  • Terms of Service
  • Contact Us

© 2024 Info Security Watch. All Rights Reserved