SolarWinds security breach enables remote code execution by threat actors

February 19, 2024
1 min read


TLDR:

  • SolarWinds ARM version 2023.2.3 fixed vulnerabilities related to Deserialization and Directory Traversal.
  • Vulnerabilities allowed attackers to execute remote code on the vulnerable instance.

SolarWinds released Access Rights Manager version 2023.2.3 to address multiple vulnerabilities that could be exploited by attackers to execute remote code. The vulnerabilities, assigned CVEs such as CVE-2023-40057 and CVE-2023-23478, were related to Deserialization and Directory Traversal. These vulnerabilities had severity ratings ranging from High to Critical. SolarWinds credited security researchers for reporting these vulnerabilities. The company urged users to upgrade to the latest version to prevent exploitation by threat actors.


Latest from Blog

Top 20 Linux Admin Tools for 2024

TLDR: Top Linux Admin Tools in 2024 Key points: Linux admin tools streamline system configurations, performance monitoring, and security management. Popular Linux admin tools include Webmin, Puppet, Zabbix, Nagios, and Ansible. Summary

Bogus job tempts aerospace, energy workers

TLDR: A North Korean cyberespionage group is posing as job recruiters to target employees in aerospace and energy sectors. Mandiant reports that the group uses fake job descriptions stored in malicious archives

Cyber insurance changes shape of security for good and bad

TLDR: Key Points: Cyber-insurance landscape is shifting to encourage greater cyber resiliency Rising costs of cyberattacks are prompting insurers to re-examine underwriting How Cyber-Insurance Shifts Affect the Security Landscape The article discusses