SolarWinds Security Updates – 22 October 2023

SolarWinds has released security updates to fix multiple vulnerabilities in the SolarWinds Access Rights Manager 2023.2 and prior versions.

The addressed vulnerabilities could allow the attacker to gain elevated privileges, execute arbitrary code, and gain access to the affected systems by sending a specially crafted request.

Sample of the addressed vulnerabilities:

1. SolarWinds Access Rights Manager Code Execution (CVE-2023-35184):

  • CVSS: 8.8
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: None
  • Consequences: Gain Access

2. SolarWinds Access Rights Manager Privilege Escalation (CVE-2023-35181):

  • CVSS: 7.8
  • Attack Vector: Local
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: None
  • Consequences: Gain Privileges
Vulnerabilities
  • CVE-2023-35180
  • CVE-2023-35181
  • CVE-2023-35182
  • CVE-2023-35183
  • CVE-2023-35184
  • CVE-2023-35185
  • CVE-2023-35186
  • CVE-2023-35187
Mitigations

The enterprise should deploy this patch as soon as the testing phase is completed.

SolarWinds Security advisory

References