Unauthenticated Access to Internal Functionality and Data via Hardcoded Credentials

CVE-2024-28987
9.1CRITICAL

Key Information

Vendor
Solarwinds
Status
Web Help Desk
Vendor
CVE Published:
21 August 2024

Badges

😄 Trended👾 Exploit Exists🔴 Public PoC🟣 EPSS 95%📰 News Worthy

Summary

The vulnerability CVE-2024-28987 in SolarWinds Web Help Desk (WHD) allows remote unauthenticated users to access internal functionality and modify data on affected systems. The severity of the vulnerability is rated 9.1 on the CVSS scoring system, making it critical. It was discovered by security researcher Zach Hanley and has the potential for active exploitation in the wild. SolarWinds has released an urgent patch for this vulnerability and recommends that users update to version 12.8.3 Hotfix 2 to protect against unauthorized remote access. The same hotfix also addresses another critical vulnerability (CVE-2024-28986) responsible for remote code execution and actively exploited by threat actors. The urgency of applying the patch is underscored by the risk posed by these vulnerabilities, including the possibility of data breaches, system compromise, and the spread of malware.

CISA Reported

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2024-28987 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace

The CISA's recommendation is: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Affected Version(s)

Web Help Desk <= 12.8.3 Hotfix 1 and previous versions

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

EPSS Score

95% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit exists.

  • Vulnerability started trending.

  • First article discovered by CybersecurityNews

  • Vulnerability published.

Collectors

NVD DatabaseMitre DatabaseCISA Database3 Proof of Concept(s)10 News Article(s)

Credit

Zach Hanley
.