SolarWinds Access Rights Manager (ARM) is susceptible to a Directory Traversal Remote Code Execution vulnerability. If exploited, this vulnerability allows an unauthenticated user to perform the actions with SYSTEM privileges.
References
Link | Resource |
---|---|
https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2024-3_release_notes.htm | Vendor Advisory |
Configurations
History
22 Aug 2024, 15:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2024-3_release_notes.htm - Vendor Advisory | |
CPE | cpe:2.3:a:solarwinds:access_rights_manager:*:*:*:*:*:*:*:* | |
First Time |
Solarwinds
Solarwinds access Rights Manager |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
18 Jul 2024, 12:28
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
17 Jul 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-17 15:15
Updated : 2024-08-22 15:23
NVD link : CVE-2024-23466
Mitre link : CVE-2024-23466
CVE.ORG link : CVE-2024-23466
JSON object : View
Products Affected
solarwinds
- access_rights_manager
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')