SolarWind Web Help Desk Java Deserialization Remote Code Execution Vulnerability
CVE-2024-28986 is a critical vulnerability in SolarWinds Web Help Desk, allowing remote code execution. Users are advised to apply patches, as CISA has included it in its Known Exploited Vulnerabilities Catalog.
Read original articleA recent vulnerability identified as CVE-2024-28986 affects SolarWinds Web Help Desk, exposing it to a Java Deserialization Remote Code Execution risk. This vulnerability could potentially allow attackers to execute commands on the host machine. Although it was initially reported as an unauthenticated vulnerability, SolarWinds has not been able to reproduce it without authentication after extensive testing. Nevertheless, the company advises all Web Help Desk users to apply the available patch as a precautionary measure. The vulnerability has been assigned a CVSS score of 9.8, indicating a critical severity level. The Cybersecurity and Infrastructure Security Agency (CISA) has included this CVE in its Known Exploited Vulnerabilities Catalog, urging users to implement mitigations or discontinue use of the product if no fixes are available. Users are encouraged to follow vendor instructions for applying the necessary updates.
- CVE-2024-28986 is a critical vulnerability in SolarWinds Web Help Desk.
- It allows for remote code execution, potentially enabling attackers to run commands on affected systems.
- SolarWinds recommends applying the available patch despite the vulnerability being unverified without authentication.
- The vulnerability has a CVSS score of 9.8, marking it as critical.
- CISA has listed this CVE in its Known Exploited Vulnerabilities Catalog, urging immediate action.
Related
Remote Unauthenticated Code Execution in OpenSSH Server
Qualys found regreSSHion, a critical RCE flaw in OpenSSH on glibc-based Linux systems. Over 14 million servers are at risk, with potential root access. Qualys created an exploit but delays release for patching.
Latest Ghostscript vulnerability haunts experts as the next big breach enabler
Infosec experts warn of critical Ghostscript vulnerability CVE-2024-29510 allowing RCE. Despite medium severity rating, exploit could lead to severe impacts like file manipulation. Urgent patching advised to prevent breaches.
Exim vulnerability affecting 1.5M servers lets attackers attach malicious files
A critical vulnerability in Exim mail transfer agent (CVE-2024-39929) exposes 1.5 million email servers to attacks delivering malicious attachments. No active exploits reported, but admins urged to update Exim to version 4.98 RC3 for protection.
The Wild West of Proof of Concept Exploit Code (PoC)
CVE-2024-6387 is a serious unauthenticated remote code execution vulnerability in OpenSSH, with complex exploitation requiring knowledge of system architecture. The exploit code contains malicious elements, emphasizing risks of untrusted code.
Zero-click Windows TCP/IP RCE impacts all systems with IPv6 enabled, patch now
Microsoft warns of a critical TCP/IP vulnerability (CVE-2024-38063) affecting all IPv6-enabled Windows systems, allowing remote code execution. Users should prioritize patching to mitigate risks, as the exploit is wormable.
Related
Remote Unauthenticated Code Execution in OpenSSH Server
Qualys found regreSSHion, a critical RCE flaw in OpenSSH on glibc-based Linux systems. Over 14 million servers are at risk, with potential root access. Qualys created an exploit but delays release for patching.
Latest Ghostscript vulnerability haunts experts as the next big breach enabler
Infosec experts warn of critical Ghostscript vulnerability CVE-2024-29510 allowing RCE. Despite medium severity rating, exploit could lead to severe impacts like file manipulation. Urgent patching advised to prevent breaches.
Exim vulnerability affecting 1.5M servers lets attackers attach malicious files
A critical vulnerability in Exim mail transfer agent (CVE-2024-39929) exposes 1.5 million email servers to attacks delivering malicious attachments. No active exploits reported, but admins urged to update Exim to version 4.98 RC3 for protection.
The Wild West of Proof of Concept Exploit Code (PoC)
CVE-2024-6387 is a serious unauthenticated remote code execution vulnerability in OpenSSH, with complex exploitation requiring knowledge of system architecture. The exploit code contains malicious elements, emphasizing risks of untrusted code.
Zero-click Windows TCP/IP RCE impacts all systems with IPv6 enabled, patch now
Microsoft warns of a critical TCP/IP vulnerability (CVE-2024-38063) affecting all IPv6-enabled Windows systems, allowing remote code execution. Users should prioritize patching to mitigate risks, as the exploit is wormable.