Breaking NewsCritical

SolarWinds Web Help Desk RCE Flaw Exploited in Wild, CISA Mandates Urgent Patch

2 min readSource: BleepingComputer

CISA adds critical SolarWinds Web Help Desk RCE vulnerability (CVE-2024-28986) to KEV catalog after active exploitation confirmed. Federal agencies given 3-day patch deadline.

Critical SolarWinds Vulnerability Under Active Exploitation, CISA Warns

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical remote code execution (RCE) vulnerability in SolarWinds Web Help Desk to its Known Exploited Vulnerabilities (KEV) catalog, confirming active exploitation in the wild. Federal civilian agencies have been ordered to patch their systems by September 5, 2024, under Binding Operational Directive (BOD) 22-01.

Technical Details

The vulnerability, tracked as CVE-2024-28986, is an authentication bypass flaw in SolarWinds Web Help Desk versions 12.8.3 HF 1 and earlier. If exploited, attackers can execute arbitrary code with elevated privileges on unpatched systems. SolarWinds released a security advisory on August 13, 2024, urging all customers to apply the available hotfix immediately.

While CISA’s directive applies only to federal agencies, security experts warn that all organizations using vulnerable SolarWinds Web Help Desk instances should prioritize patching due to the flaw’s critical severity (CVSS score pending).

Impact Analysis

The active exploitation of CVE-2024-28986 poses significant risks, including:

  • Unauthorized system access with administrative privileges
  • Data exfiltration or manipulation of help desk operations
  • Lateral movement within compromised networks
  • Potential for supply chain attacks, given SolarWinds’ history as a high-value target (e.g., 2020 Sunburst breach)

Recommendations

  1. Immediate Patch Deployment: Apply SolarWinds’ hotfix for Web Help Desk 12.8.3 HF 2 or upgrade to a patched version without delay.
  2. Network Segmentation: Isolate Web Help Desk servers from critical infrastructure until remediation is complete.
  3. Monitor for Indicators of Compromise (IOCs): Review logs for unusual authentication attempts or unauthorized access.
  4. Third-Party Risk Assessment: Audit vendors or partners with access to SolarWinds systems for potential exposure.

CISA’s inclusion of CVE-2024-28986 in the KEV catalog underscores the urgency of addressing this flaw, particularly for organizations managing sensitive data or critical infrastructure. Further details are available in SolarWinds’ official advisory.

Share