Home

Description

SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. This vulnerability was found by the ZDI team after researching a previous vulnerability and providing this report. The ZDI team was able to discover an unauthenticated attack during their research.  We recommend all Web Help Desk customers apply the patch, which is now available.  We thank Trend Micro Zero Day Initiative (ZDI) for its ongoing partnership in coordinating with SolarWinds on responsible disclosure of this and other potential vulnerabilities.

PUBLISHED Reserved 2024-03-13 | Published 2025-09-01 | Updated 2025-09-03 | Assigner SolarWinds




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-502 Deserialization of Untrusted Data

Product status

Default status
affected

12.8.3 HF 2 and previous versions
affected

Credits

Guy Lederfein of Trend Micro finder

References

support.solarwinds.com/...nter/s/article/WHD-12-8-3-Hotfix-3

www.solarwinds.com/...ter/security-advisories/CVE-2024-28988

cve.org (CVE-2024-28988)

nvd.nist.gov (CVE-2024-28988)

Download JSON