CVE-2024-52606
Published: 11 February 2025
Summary
CVE-2024-52606 is a low-severity SSRF (CWE-918) vulnerability in Solarwinds Solarwinds Platform. Its CVSS base score is 3.5 (Low).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 36.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates SSRF by requiring validation and sanitization of user inputs to prevent malicious web requests in the SolarWinds Platform.
Ensures timely patching of the specific SSRF vulnerability as addressed in SolarWinds Platform 2025.1 release.
Limits SSRF impact by enforcing boundary protections that restrict forged server-side requests to unauthorized internal or external resources.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SSRF in a web platform directly enables server-side request forgery against internal resources, aligning with exploitation of an application interface (T1190); adjacent-network/authenticated constraints and low impact reduce certainty of broad applicability.
NVD Description
SolarWinds Platform is affected by server-side request forgery vulnerability. Proper input sanitation was not applied allowing for the possibility of a malicious web request.
Deeper analysisAI
CVE-2024-52606 is a server-side request forgery (SSRF) vulnerability in the SolarWinds Platform, stemming from inadequate input sanitization that enables malicious web requests. Mapped to CWE-918, it carries a CVSS v3.1 base score of 3.5 (AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N), indicating low severity with adjacent network access required, low attack complexity, and low privileges needed.
Exploitation requires an authenticated user with low privileges on an adjacent network, who can then craft requests to forge server-side interactions. Successful attacks result in low integrity impact, potentially allowing manipulation of internal requests without compromising confidentiality or availability.
SolarWinds addresses the issue in the Platform 2025.1 release, as detailed in the release notes. Additional mitigation guidance and details are provided in the vendor's security advisory at https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-52606. Practitioners should update to the patched version promptly.
Details
- CWE(s)