Article Details
Scrape Timestamp (UTC): 2024-07-19 07:15:57.249
Source: https://thehackernews.com/2024/07/solarwinds-patches-11-critical-flaws-in.html
Original Article Text
Click to Toggle View
SolarWinds Patches 11 Critical Flaws in Access Rights Manager Software. SolarWinds has addressed a set of critical security flaws impacting its Access Rights Manager (ARM) software that could be exploited to access sensitive information or execute arbitrary code. Of the 11 vulnerabilities, seven are rated Critical in severity and carry a CVSS score of 9.6 out of 10.0. The remaining four weaknesses have been rated High in severity, with each of them having a CVSS score of 7.6. The most severe of the flaws are listed below - Successful exploitation of the aforementioned vulnerabilities could allow an attacker to read and delete files and execute code with elevated privileges. The shortcomings have been addressed in version 2024.3 released on July 17, 2024, following responsible disclosure as part of the Trend Micro Zero Day Initiative (ZDI). The development comes after the U.S. Cybersecurity and Infrastructure Security Agency (CISA) placed a high-severity path traversal flaw in SolarWinds Serv-U Path (CVE-2024-28995, CVSS score: 8.6) to its Known Exploited Vulnerabilities (KEV) catalog following reports of active exploitation in the wild. The network security company was the victim of a major supply chain attack in 2020 after the update mechanism associated with its Orion network management platform was compromised by Russian APT29 hackers to distribute malicious code to downstream customers as part of a high-profile cyber espionage campaign. The breach prompted the U.S. Securities and Exchange Commission (SEC) to file a lawsuit against SolarWinds and its chief information security officer (CISO) last October alleging the company failed to disclose adequate material information to investors regarding cybersecurity risks. However, much of the claims pertaining to the lawsuit were thrown out by the U.S. District Court for the Southern District of New York on July 18, stating "these do not plausibly plead actionable deficiencies in the company's reporting of the cybersecurity hack" and that they "impermissibly rely on hindsight and speculation."
Daily Brief Summary
SolarWinds has patched 11 security vulnerabilities in its Access Rights Manager (ARM) software, with 7 rated as Critical.
These critical flaws, with a CVSS score of 9.6, could allow attackers to read, delete files, and execute code with elevated privileges.
The remaining four vulnerabilities are considered High risk, each with a CVSS score of 7.6.
Exploitation of these vulnerabilities could lead to significant information exposure and unauthorized system control.
Updates fixing these vulnerabilities were released in SolarWinds ARM version 2024.3 on July 17, 2024.
The patches followed a responsible disclosure by the Trend Micro Zero Day Initiative.
Additionally, a high-severity flaw in SolarWinds' Serv-U Path was added to CISA’s KEV catalog due to active exploitation.
This security update follows historical breaches, including a significant supply chain attack in 2020 carried out by Russian hackers.