Article Details

Original Article Text

Click to Toggle View

Critical RCE flaws found in SolarWinds access audit solution. Security researchers found three critical remote code execution vulnerabilities in the SolarWinds Access Rights Manager (ARM) product that remote attackers could use to run code with SYSTEM privileges. SolarWinds ARM is a tool that enables organizations to manage and audit user access rights across their IT environments. It offers Microsoft Active Directory integration, role-based access control, visual feedback, and more. Through Trend Micro’s Zero Day Initiative (ZDI), researchers reported eight flaws in the SolarWinds solution on June 22, three of them with critical severity. The vendor addressed all vulnerabilities earlier this week with a patch available in version 2023.2.1 of its Access Rights Manager. Below is the description and identifier for the three critical remote code execution (RCE): Executing code in the context of “SYSTEM” on Windows computers means that it runs with the highest privileges on the machine. SYSTEM is an internal account reserved for the operating system and its services. Attackers gaining this level of privileges have full control over all files on the victim machine. The rest of the security issues that SolarWinds addressed in its Access Right Manager are high-severity and attackers could exploit them to increase permissions or execute arbitrary code on the host after authentication. SolarWinds published an advisory this week describing the eight vulnerabilities and their severity rating, as assessed by the company. It is worth noting that the company did not rate any of the security issues as critical and the highest rating is 8.8, for high-severity issues.

Daily Brief Summary

CYBERCRIME // Critical Remote Code Execution Flaws Identified in SolarWinds Access Rights Manager

Researchers have identified three serious remote code execution vulnerabilities in the SolarWinds Access Rights Manager (ARM) product.

These flaws could allow remote attackers to execute code with system privileges.

The flaws were found and reported through Trend Micro’s Zero Day Initiative (ZDI) on June 22. In total, eight vulnerabilities were found in the SolarWinds solution; three of these are considered critical in severity.

SolarWinds has addressed all vulnerabilities highlighted in the report and a patch is available in version 2023.2.1 of its Access Rights Manager.

Despite the researchers' assessments, SolarWinds did not classify any vulnerabilities as critical, with the highest rating given being 8.8 for high-severity issues.