CVE-2024-28988: Remote Attackers Could Exploit SolarWinds Web Help Desk Flaw
A critical vulnerability has been identified in SolarWinds Web Help Desk, enabling attackers to remotely execute arbitrary code on affected systems (RCE). Registered as CVE-2024-28988, the issue was uncovered by experts from the Zero Day Initiative (ZDI) during an analysis of a previous security flaw.
The vulnerability stems from a deserialization flaw in Java, allowing malicious actors to execute unauthorized commands on the targeted device. This type of vulnerability is particularly dangerous as it does not require authentication, significantly easing the path to exploitation.
SolarWinds Web Help Desk version 12.8.3 HF2 and all prior versions are affected. ZDI researchers discovered this issue while investigating another vulnerability, highlighting the critical importance of conducting regular security audits.
SolarWinds promptly released a patch to address the issue. The updated version, SolarWinds Web Help Desk 12.8.3 HF3, is now available for download, and all users are strongly encouraged to install the update as soon as possible to secure their systems. The company expressed gratitude to the ZDI team for their responsible disclosure and collaboration, which allowed for the timely mitigation of the threat.
This incident underscores the ongoing risks associated with software vulnerabilities and serves as a reminder to organizations of the paramount importance of prioritizing security updates. Implementing regular vulnerability assessments, keeping software up to date, and enhancing access control measures will help minimize the risk of similar vulnerabilities being exploited in the future.