Lucene search

K
thnThe Hacker NewsTHN:B045D9E3344F9BCAB1EC7DD0913AE4F2
HistoryAug 15, 2024 - 1:19 p.m.

SolarWinds Releases Patch for Critical Flaw in Web Help Desk Software

2024-08-1513:19:00
The Hacker News
thehackernews.com
11
solarwinds
patch
critical flaw
web help desk
security vulnerability
deserialization bug
cve-2024-28986
remote code execution
hotfix
palo alto networks
vulnerability
cortex xsoar
command injection
cve-2024-5914
cve-2024-5915
cve-2024-5916
cisa
known exploited vulnerabilities catalog

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS4

7

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/SC:H/VI:L/SI:H/VA:L/SA:N/AU:N/U:Amber/R:U/V:D/RE:M

AI Score

10

Confidence

High

EPSS

0.03

Percentile

91.1%

SolarWinds

SolarWinds has released patches to address a critical security vulnerability in its Web Help Desk software that could be exploited to execute arbitrary code on susceptible instances.

The flaw, tracked as CVE-2024-28986 (CVSS score: 9.8), has been described as a deserialization bug.

“SolarWinds Web Help Desk was found to be susceptible to a Java deserialization remote code execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine,” the company said in an advisory.

“While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing.”

The flaw impacts all versions of SolarWinds Web Help Desk including and prior to 12.8.3. It has been addressed in hotfix version 12.8.3 HF 1.

Cybersecurity

The disclosure comes as Palo Alto Networks patched a high-severity vulnerability affecting Cortex XSOAR that could result in command injection and code execution.

Assigned the CVE identifier CVE-2024-5914 (CVSS score: 7.0), the shortcoming impacts all versions of Cortex XSOAR CommonScripts before 1.12.33.

“A command injection issue in Palo Alto Networks Cortex XSOAR CommonScripts Pack allows an unauthenticated attacker to execute arbitrary commands within the context of an integration container,” the company said.

“To be exposed, an integration must make use of the ScheduleGenericPolling or GenericPollingScheduledTask scripts from the CommonScripts pack.”

Also addressed by Palo Alto Networks are two moderate-severity issues listed below -

  • CVE-2024-5915 (CVSS score: 5.2) - A privilege escalation (PE) vulnerability in the GlobalProtect app on Windows devices that enables a local user to execute programs with elevated privileges
  • CVE-2024-5916 (CVSS score: 6.0) - An information exposure vulnerability in PAN-OS software that enables a local system administrator to access secrets, passwords, and tokens of external systems

Users are recommended to update to the latest version to mitigate potential risks. As a precautionary measure, it’s also advised to revoke the secrets, passwords, and tokens that are configured in PAN-OS firewalls after the upgrade.

Update

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the SolarWinds flaw CVE-2024-28986 to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. Federal agencies are required to apply the fixes by September 5, 2024.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS4

7

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/SC:H/VI:L/SI:H/VA:L/SA:N/AU:N/U:Amber/R:U/V:D/RE:M

AI Score

10

Confidence

High

EPSS

0.03

Percentile

91.1%

Related for THN:B045D9E3344F9BCAB1EC7DD0913AE4F2