Cyber Posture

CVE-2024-52606

Low

Published: 11 February 2025

Published
11 February 2025
Modified
25 February 2025
KEV Added
Patch
CVSS Score 3.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
EPSS Score 0.0044 63.3th percentile
Risk Priority 7 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-52606 is a low-severity SSRF (CWE-918) vulnerability in Solarwinds Solarwinds Platform. Its CVSS base score is 3.5 (Low).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 36.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates SSRF by requiring validation and sanitization of user inputs to prevent malicious web requests in the SolarWinds Platform.

prevent

Ensures timely patching of the specific SSRF vulnerability as addressed in SolarWinds Platform 2025.1 release.

prevent

Limits SSRF impact by enforcing boundary protections that restrict forged server-side requests to unauthorized internal or external resources.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SSRF in a web platform directly enables server-side request forgery against internal resources, aligning with exploitation of an application interface (T1190); adjacent-network/authenticated constraints and low impact reduce certainty of broad applicability.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

SolarWinds Platform is affected by server-side request forgery vulnerability. Proper input sanitation was not applied allowing for the possibility of a malicious web request.

Deeper analysisAI

CVE-2024-52606 is a server-side request forgery (SSRF) vulnerability in the SolarWinds Platform, stemming from inadequate input sanitization that enables malicious web requests. Mapped to CWE-918, it carries a CVSS v3.1 base score of 3.5 (AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N), indicating low severity with adjacent network access required, low attack complexity, and low privileges needed.

Exploitation requires an authenticated user with low privileges on an adjacent network, who can then craft requests to forge server-side interactions. Successful attacks result in low integrity impact, potentially allowing manipulation of internal requests without compromising confidentiality or availability.

SolarWinds addresses the issue in the Platform 2025.1 release, as detailed in the release notes. Additional mitigation guidance and details are provided in the vendor's security advisory at https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-52606. Practitioners should update to the patched version promptly.

Details

CWE(s)

Affected Products

solarwinds
solarwinds platform
≤ 2025.1

CVEs Like This One

CVE-2025-40536Same product class: network monitoring / SIEM
CVE-2025-40554Same product class: network monitoring / SIEM
CVE-2025-40553Same product class: network monitoring / SIEM
CVE-2025-40552Same product class: network monitoring / SIEM
CVE-2025-40539Same product class: network monitoring / SIEM
CVE-2025-26399Same product class: network monitoring / SIEM
CVE-2025-40551Same product class: network monitoring / SIEM
CVE-2025-40540Same product class: network monitoring / SIEM
CVE-2025-40541Same product class: network monitoring / SIEM
CVE-2024-28988Same product class: network monitoring / SIEM

References