August 18th, 2024

SolarWind Web Help Desk Java Deserialization Remote Code Execution Vulnerability

CVE-2024-28986 is a critical vulnerability in SolarWinds Web Help Desk, allowing remote code execution. Users are advised to apply patches, as CISA has included it in its Known Exploited Vulnerabilities Catalog.

Read original articleLink Icon
SolarWind Web Help Desk Java Deserialization Remote Code Execution Vulnerability

A recent vulnerability identified as CVE-2024-28986 affects SolarWinds Web Help Desk, exposing it to a Java Deserialization Remote Code Execution risk. This vulnerability could potentially allow attackers to execute commands on the host machine. Although it was initially reported as an unauthenticated vulnerability, SolarWinds has not been able to reproduce it without authentication after extensive testing. Nevertheless, the company advises all Web Help Desk users to apply the available patch as a precautionary measure. The vulnerability has been assigned a CVSS score of 9.8, indicating a critical severity level. The Cybersecurity and Infrastructure Security Agency (CISA) has included this CVE in its Known Exploited Vulnerabilities Catalog, urging users to implement mitigations or discontinue use of the product if no fixes are available. Users are encouraged to follow vendor instructions for applying the necessary updates.

- CVE-2024-28986 is a critical vulnerability in SolarWinds Web Help Desk.

- It allows for remote code execution, potentially enabling attackers to run commands on affected systems.

- SolarWinds recommends applying the available patch despite the vulnerability being unverified without authentication.

- The vulnerability has a CVSS score of 9.8, marking it as critical.

- CISA has listed this CVE in its Known Exploited Vulnerabilities Catalog, urging immediate action.

Link Icon 2 comments