9.8

CVE-2024-28988

Medienbericht
SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. This vulnerability was found by the ZDI team after researching a previous vulnerability and providing this report. The ZDI team was able to discover an unauthenticated attack during their research. 





We recommend all Web Help Desk customers apply the patch, which is now available. 





We thank Trend Micro Zero Day Initiative (ZDI) for its ongoing partnership in coordinating with SolarWinds on responsible disclosure of this and other potential vulnerabilities.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
SolarwindsWeb Help Desk Version <= 12.8.2
SolarwindsWeb Help Desk Version12.8.3 Update-
SolarwindsWeb Help Desk Version12.8.3 Updatehotfix1
SolarwindsWeb Help Desk Version12.8.3 Updatehotfix2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 7.05% 0.914
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
psirt@solarwinds.com 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-502 Deserialization of Untrusted Data

The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.