September 17, 2024 at 01:15AM
SolarWinds released fixes for two security flaws in its Access Rights Manager (ARM) software. The critical vulnerability (CVE-2024-28991) with a 9.0 CVSS score allows remote code execution. A medium-severity flaw (CVE-2024-28990) was also addressed. Security researcher Piotr Bazydlo discovered the flaws, and updates to ARM version 2024.3.1 are recommended to protect against potential threats.
Key takeaways from the meeting notes:
1. SolarWinds has released fixes for two security flaws in its Access Rights Manager (ARM) software, including a critical vulnerability (CVE-2024-28991) rated 9.0 on the CVSS scoring system, which could result in remote code execution.
2. The vulnerability was discovered by security researcher Piotr Bazydlo of the Trend Micro Zero Day Initiative (ZDI) and exists within a class called JsonSerializationBinder. The flaw was reported on May 24, 2024.
3. Another medium-severity flaw (CVE-2024-28990, CVSS score: 6.3) in ARM exposed a hard-coded credential that could allow unauthorized access to the RabbitMQ management console. Both issues have been patched in ARM version 2024.3.1.
4. Users are advised to update to the latest ARM version to safeguard against potential threats, although there is currently no evidence of active exploitation of the vulnerabilities.
5. D-Link has also resolved three critical vulnerabilities affecting specific router models (CVE-2024-45694, CVE-2024-45695, and CVE-2024-45697, CVSS scores: 9.8) that could enable remote execution of arbitrary code and system commands.
6. Readers are encouraged to follow SolarWinds on Twitter and LinkedIn for more exclusive content.
If you have any further questions or need additional details, feel free to ask!