Virtual Event Now Live: Zero Trust Strategies Summit! - Login for Access
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

SolarWinds Patches Critical Vulnerability in Access Rights Manager

SolarWinds has announced patches for a critical-severity remote code execution vulnerability in Access Rights Manager.

SolarWinds

SolarWinds has announced patches for two vulnerabilities in its Active Directory (AD) and Azure AD user provisioning tool Access Rights Manager, including a critical-severity bug.

Tracked as CVE-2024-28991 (CVSS score of 9.0), the critical security defect could allow remote attackers to execute arbitrary code on an affected system.

“If exploited, this vulnerability would allow an authenticated user to abuse the service, resulting in remote code execution,” SolarWinds notes in its advisory. The company has credited Piotr Bazydlo of Trend Micro’s Zero Day Initiative for reporting the issue.

A ZDI advisory reveals that CVE-2024-28991 is a deserialization of untrusted data flaw that exists because user-supplied data is not properly validated.

“An attacker can leverage this vulnerability to execute code in the context of SYSTEM,” ZDI explains, noting that the issue has a CVSS score of 9.9.

The advisory also shows that, while authentication is required to exploit this security defect, an attacker can bypass the existing authentication mechanism.

The second issue resolved in Access Rights Manager is a hardcoded credential vulnerability that could allow an attacker to bypass authentication and access the RabbitMQ management console. Tracked as CVE-2024-28990, it was also reported by Piotr Bazydlo.

“The specific flaw exists within the configuration of a RabbitMQ instance. The issue results from the use of hard-coded credentials. An attacker can leverage this vulnerability to bypass RabbitMQ authentication,” ZDI explains.

Advertisement. Scroll to continue reading.

Both vulnerabilities were resolved with the release of Access Rights Manager version 2024.3.1. Users are advised to update their installations as soon as possible. 

SolarWinds makes no mention of any of these vulnerabilities being exploited in the wild.

Related: SolarWinds Patches Critical Vulnerabilities in Access Rights Manager

Related: SolarWinds Web Help Desk Vulnerability Possibly Exploited as Zero-Day

Related: Ivanti Patches Critical Vulnerabilities in Endpoint Manager

Related: Zyxel Patches Critical Vulnerabilities in Networking Devices

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join SecurityWeek and Hitachi Vantara for this this webinar to gain valuable insights and actionable steps to enhance your organization's data security and resilience.

Register

Event: ICS Cybersecurity Conference

The leading industrial cybersecurity conference for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Register

People on the Move

Nupur Goyal has joined cloud identity security and management solutions provider Saviynt as VP of Product Marketing.

Threat intelligence firm Intel 471 has appointed Mark Huebeler as its COO and CFO.

Omkhar Arasaratnam, former GM at OpenSSF, is LinkedIn's first Distinguised Security Engineer

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.