Skip to content

Commit

Permalink
Advisory-20240823001 (#949)
Browse files Browse the repository at this point in the history
* Cisco Affected by OpenSSH Vulnerability

* Format markdown docs

* Update 20240709001-Cisco-Affected-by-OpenSSH-Vulnerability.md

Update with link to previous mentioned CVE advisory

* Oracle Critical Patch Update

* Format markdown docs

* Update 20240719001

* Format markdown docs

* Okta Releases Browser Plugin Advisory

* Format markdown docs

* Update 20240723002

* Advisory_20240801002

* Format markdown docs

* Update 20240801002

Applied "advisory-CISA-ICS-Advisories" template

* Format markdown docs

* Update 20240801002_02

Hyperlink fix

* Format markdown docs

* Advisory-20240823001

* Format markdown docs

---------

Co-authored-by: CharlesRN <CharlesRN@users.noreply.github.com>
Co-authored-by: Joshua Hitchen (DGov) <86041569+DGovEnterprise@users.noreply.github.com>
Co-authored-by: JadonWill <117053393+JadonWill@users.noreply.github.com>
Co-authored-by: JadonWill <JadonWill@users.noreply.github.com>
  • Loading branch information
5 people authored Aug 23, 2024
1 parent b83d7d7 commit abd040f
Showing 1 changed file with 25 additions and 0 deletions.
25 changes: 25 additions & 0 deletions docs/advisories/20240823001-SolarWinds-Releases-Critical-Update.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
# SolarWinds Releases Critical Update - 20240823001

## Overview

The SolarWinds Web Help Desk (WHD) software is affected by a hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data.

## What is vulnerable?

| Product(s) Affected | Version(s) | CVE | CVSS | Severity |
| ------------------------ | --------------------------------------- | ----------------------------------------------------------------- | ---- | ------------ |
| SolarWinds Web Help Desk | **all versions before** 12.8.3 Hotfix 2 | [CVE-2024-28987](https://nvd.nist.gov/vuln/detail/CVE-2024-28987) | 9.1 | **Critical** |

## What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

## Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *48 Hours...* (refer [Patch Management](../guidelines/patch-management.md)):

- SolarWinds article: <https://support.solarwinds.com/SuccessCenter/s/article/SolarWinds-Web-Help-Desk-12-8-3-Hotfix-2>

## Additional References

- Cybersecurity News article: <https://securityonline.info/solarwinds-web-help-desk-hit-by-critical-vulnerability-cve-2024-28987>

0 comments on commit abd040f

Please sign in to comment.