SolarWinds has addressed a set of important security flaws impacting its Entry Rights Supervisor (ARM) software program that might be exploited to entry delicate data or execute arbitrary code.
Of the 11 vulnerabilities, seven are rated Crucial in severity and carry a CVSS rating of 9.6 out of 10.0. The remaining 4 weaknesses have been rated Excessive in severity, with every of them having a CVSS rating of seven.6.
Probably the most extreme of the failings are listed beneath –
- CVE-2024-23472 – SolarWinds ARM Listing Traversal Arbitrary File Deletion and Info Disclosure Vulnerability
- CVE-2024-28074 – SolarWinds ARM Inner Deserialization Distant Code Execution Vulnerability
- CVE-2024-23469 – Solarwinds ARM Uncovered Harmful Methodology Distant Code Execution Vulnerability
- CVE-2024-23475 – Solarwinds ARM Traversal and Info Disclosure Vulnerability
- CVE-2024-23467 – Solarwinds ARM Traversal Distant Code Execution Vulnerability
- CVE-2024-23466 – Solarwinds ARM Listing Traversal Distant Code Execution Vulnerability
- CVE-2024-23471 – Solarwinds ARM CreateFile Listing Traversal Distant Code Execution Vulnerability
Profitable exploitation of the aforementioned vulnerabilities might enable an attacker to learn and delete recordsdata and execute code with elevated privileges.
The shortcomings have been addressed in model 2024.3 launched on July 17, 2024, following accountable disclosure as a part of the Pattern Micro Zero Day Initiative (ZDI).

The event comes after the U.S. Cybersecurity and Infrastructure Safety Company (CISA) positioned a high-severity path traversal flaw in SolarWinds Serv-U Path (CVE-2024-28995, CVSS rating: 8.6) to its Recognized Exploited Vulnerabilities (KEV) catalog following stories of lively exploitation within the wild.
The community security firm was the sufferer of a serious provide chain assault in 2020 after the replace mechanism related to its Orion community administration platform was compromised by Russian APT29 hackers to distribute malicious code to downstream prospects as a part of a high-profile cyber espionage marketing campaign.
The breach prompted the U.S. Securities and Alternate Fee (SEC) to file a lawsuit towards SolarWinds and its chief data security officer (CISO) final October alleging the corporate didn’t disclose sufficient materials data to buyers concerning cybersecurity dangers.
Nonetheless, a lot of the claims pertaining to the lawsuit have been thrown out by the U.S. District Courtroom for the Southern District of New York on July 18, stating “these don’t plausibly plead actionable deficiencies within the firm’s reporting of the cybersecurity hack” and that they “impermissibly depend on hindsight and hypothesis.”