Cyber security news for all

More

    SolarWinds Issues Patch for Serious Security Flaw in Web Help Desk Software

    SolarWinds has rolled out updates to fix a major security vulnerability in its Web Help Desk software, which could allow attackers to execute arbitrary code on affected systems.

    This vulnerability, designated CVE-2024-28986 with a CVSS score of 9.8, is a deserialization flaw.

    “SolarWinds Web Help Desk was discovered to be vulnerable to a Java deserialization remote code execution issue that, if exploited, would permit an attacker to execute commands on the host machine,” the company stated in a security advisory.

    “Although this vulnerability was initially reported as unauthenticated, SolarWinds could not reproduce it without authentication after extensive testing.”

    The issue affects all versions of SolarWinds Web Help Desk up to and including 12.8.3, and has been resolved in hotfix version 12.8.3 HF 1.

    This disclosure follows a high-severity vulnerability patch by Palo Alto Networks for Cortex XSOAR, which could lead to command injection and code execution.

    Labeled CVE-2024-5914 with a CVSS score of 7.0, this vulnerability affects all versions of Cortex XSOAR CommonScripts prior to 1.12.33.

    “Palo Alto Networks Cortex XSOAR CommonScripts Pack has a command injection vulnerability that allows an unauthenticated attacker to run arbitrary commands within an integration container,” the company reported.

    “To be vulnerable, an integration must use the ScheduleGenericPolling or GenericPollingScheduledTask scripts from the CommonScripts pack.”

    Palo Alto Networks also addressed two moderate-severity issues:

    • CVE-2024-5915 (CVSS score: 5.2): A privilege escalation vulnerability in the GlobalProtect app on Windows, allowing a local user to run programs with elevated privileges.
    • CVE-2024-5916 (CVSS score: 6.0): An information exposure vulnerability in PAN-OS software, which lets a local system administrator access secrets, passwords, and tokens from external systems.

    Users are advised to update to the latest versions to avoid potential security risks. Additionally, it is recommended to revoke secrets, passwords, and tokens configured in PAN-OS firewalls after applying the upgrade.

    Recent Articles

    Related Stories