SolarWinds security breach enables remote code execution by threat actors

February 19, 2024
1 min read


TLDR:

  • SolarWinds ARM version 2023.2.3 fixed vulnerabilities related to Deserialization and Directory Traversal.
  • Vulnerabilities allowed attackers to execute remote code on the vulnerable instance.

SolarWinds released Access Rights Manager version 2023.2.3 to address multiple vulnerabilities that could be exploited by attackers to execute remote code. The vulnerabilities, assigned CVEs such as CVE-2023-40057 and CVE-2023-23478, were related to Deserialization and Directory Traversal. These vulnerabilities had severity ratings ranging from High to Critical. SolarWinds credited security researchers for reporting these vulnerabilities. The company urged users to upgrade to the latest version to prevent exploitation by threat actors.


Latest from Blog

EU push for unified incident report rules

TLDR: The Federation of European Risk Management Associations (FERMA) is urging the EU to harmonize cyber incident reporting requirements ahead of new legislation. Upcoming legislation such as the NIS2 Directive, DORA, and