Article Details
Scrape Timestamp (UTC): 2024-08-15 13:21:04.557
Source: https://thehackernews.com/2024/08/solarwinds-releases-patch-for-critical.html
Original Article Text
Click to Toggle View
SolarWinds Releases Patch for Critical Flaw in Web Help Desk Software. SolarWinds has released patches to address a critical security vulnerability in its Web Help Desk software that could be exploited to execute arbitrary code on susceptible instances. The flaw, tracked as CVE-2024-28986 (CVSS score: 9.8), has been described as a deserialization bug. "SolarWinds Web Help Desk was found to be susceptible to a Java deserialization remote code execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine," the company said in an advisory. "While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing." The flaw impacts all versions of SolarWinds Web Help Desk including and prior to 12.8.3. It has been addressed in hotfix version 12.8.3 HF 1. The disclosure comes as Palo Alto Networks patched a high-severity vulnerability affecting Cortex XSOAR that could result in command injection and code execution. Assigned the CVE identifier CVE-2024-5914 (CVSS score: 7.0), the shortcoming impacts all versions of Cortex XSOAR CommonScripts before 1.12.33. "A command injection issue in Palo Alto Networks Cortex XSOAR CommonScripts Pack allows an unauthenticated attacker to execute arbitrary commands within the context of an integration container," the company said. "To be exposed, an integration must make use of the ScheduleGenericPolling or GenericPollingScheduledTask scripts from the CommonScripts pack." Also addressed by Palo Alto Networks are two moderate-severity issues listed below - Users are recommended to update to the latest version to mitigate potential risks. As a precautionary measure, it's also advised to revoke the secrets, passwords, and tokens that are configured in PAN-OS firewalls after the upgrade.
Daily Brief Summary
SolarWinds has issued a patch for a critical vulnerability (CVE-2024-28986) in its Web Help Desk software, allowing remote code execution.
The flaw, identified as a deserialization issue with a CVSS score of 9.8, potentially lets attackers run commands on the host machine.
SolarWinds initially reported the vulnerability as unauthenticated but later confirmed that exploitation requires authentication.
All versions of Web Help Desk up to 12.8.3 are affected, with a fix provided in hotfix version 12.8.3 HF 1.
In parallel, Palo Alto Networks fixed a high-severity command injection vulnerability (CVE-2024-5914) in its Cortex XSOAR platform, impacting all versions of CommonScripts before 1.12.33.
The issue in Palo Alto’s software, rated with a CVSS score of 7.0, allows unauthenticated command execution within integration containers.
Users are urged to update Cortex XSOAR and review and reset all configured secrets, passwords, and tokens in PAN-OS firewalls as a preemptive security measure.