The security flaw could allow attackers to access vulnerable web helpdesk instances without authentication. Credit: Gorodenkoff / Shutterstock SolarWinds has issued a hotfix to patch up a security oversight that could allow remote access to sensitive credentials hardcoded in its Web Help Desk (WHD) product. The vulnerability, tracked as CVE-2024-28987, has been rated “critical” with a CVSS score of 9.1 out of 10. “The SolarWinds Web Help Desk software is affected by a hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data,” said the software maker in the hotfix release notes. Sensitive credentials exposed Due to a critical oversight on the developers’ part, some hardcoded credentials were left within WHD that can allow malicious actors easy access into vulnerable instances without any backdoor. SolarWinds’ WHD is a web-based IT service management (ITSM) software solution designed to help organizations manage their help desk and IT support operations with a centralized platform for tracking, managing, and resolving service requests and incidents. WHD customers include those from critical business sectors including healthcare, government, and financial services, and a vulnerability that can allow remote access into their systems can potentially put sensitive data in danger. While no active exploitation has been reported yet, SolarWinds is recommending swift patching to stay ahead of the adversaries. Zach Hanley, the vulnerability researcher credited for the discovery of the vulnerability has promised further details. “Reported a critical vulnerability to SolarWinds on Friday after digging into the recent CISA KEV CVE-2024-28986 for WebHelpDesk, amazed they’ve already shipped a patch 4 days later!” Hanley wrote on X. “Will release some details next month.” Additional Fixes Along with the fix for the WHD hardcoded credential vulnerability, the hotfix, which refers to a small, targeted software update designed to address specific vulnerabilities, also included an upgraded version of a recent hotfix addressing CVE-2024-28986, a 9.8 CVSS, remote code execution vulnerability affecting the same product. “For your protection and to quickly deliver SolarWinds customers a secure version of WHD, we applied an aggressive security patch in WHD 12.8.3 Hotfix 1 on August 13, 2024,” SolarWinds said in an earlier update. “In a few cases, this approach impacted product functionality such as SSO.” The hotfix targeted for the hardcoded credentials vulnerability, dubbed WHD 12.8.3 Hotfix 2, resolves the problem as it “adds more patterns to fix (the) SSO issue.” The 9.8 CVSS scorer was recently added by CISA to its known exploited vulnerabilities catalog (KEV) based on evidence of active exploitation. Related content news Google ups bug bounties for ‘high quality’ Chrome hunters Security researchers can now earn a quarter million dollars reporting high-impact memory corruption vulnerabilities in Chrome. By CSO Staff and Mikael Markander 29 Aug 2024 3 mins Vulnerabilities news Critical plugin flaw opens over a million WordPress sites to RCE attacks The multilingual plugin is hit with a critical bug that can allow complete site compromise through remote code execution. By Shweta Sharma 28 Aug 2024 3 mins Vulnerabilities feature Is the vulnerability disclosure process glitched? How CISOs are being left in the dark Better communication and collaboration between researchers and vendors and improved bug reporting mechanisms could help address confusing and sometimes wholly suppressed bug reports. By Cynthia Brumfield 26 Aug 2024 10 mins CSO and CISO Threat and Vulnerability Management Data and Information Security news WordPress users not on Windows urged to update due to critical LiteSpeed Cache flaw Updating to version 6.4 or higher will prevent exploitation of the vulnerability that allows attacker to gain admin access. By Lynn Greiner 23 Aug 2024 3 mins Threat and Vulnerability Management Identity and Access Management Vulnerabilities PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe