Metrics
Affected Vendors & Products
No advisories yet.
Solution
All SolarWinds customers are advised to upgrade to the latest version of the SolarWinds Access Rights Manager (ARM) 2024.3.1 SR
Workaround
No workaround given by the vendor.
Mon, 16 Sep 2024 18:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | NVD-CWE-noinfo | 
Thu, 12 Sep 2024 20:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Solarwinds
         Solarwinds access Rights Manager  | 
|
| CPEs | cpe:2.3:a:solarwinds:access_rights_manager:*:*:*:*:*:*:*:* | |
| Vendors & Products | 
        
        Solarwinds
         Solarwinds access Rights Manager  | 
|
| Metrics | 
        
        ssvc
         
  | 
Thu, 12 Sep 2024 13:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | SolarWinds Access Rights Manager (ARM) was found to be susceptible to a remote code execution vulnerability. If exploited, this vulnerability would allow an authenticated user to abuse the service, resulting in remote code execution. | |
| Title | SolarWinds Access Rights Manager (ARM) Deserialization of Untrusted Data Remote Code Execution | |
| Weaknesses | CWE-502 | |
| References | 
         | |
| Metrics | 
        
        cvssV3_1
         
  | 
Status: PUBLISHED
Assigner: SolarWinds
Published:
Updated: 2024-09-17T03:55:15.762Z
Reserved: 2024-03-13T20:27:09.783Z
Link: CVE-2024-28991
Updated: 2024-09-12T19:13:30.939Z
Status : Analyzed
Published: 2024-09-12T14:16:06.540
Modified: 2024-09-16T18:06:20.037
Link: CVE-2024-28991
No data.
                        OpenCVE Enrichment
                    No data.