SolarWinds Web Help Desk was susceptible to a local file read vulnerability. This vulnerability requires the software be installed on Linux and configured to use non-default development/test mode making exposure to the vulnerability very limited.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-41638 SolarWinds Web Help Desk was susceptible to a local file read vulnerability. This vulnerability requires the software be installed on Linux and configured to use non-default development/test mode making exposure to the vulnerability very limited.
Fixes

Solution

SolarWinds recommends customers upgrade to SolarWinds Web Help Desk 12.8.4 as soon as it becomes available.


Workaround

No workaround given by the vendor.

History

Tue, 25 Feb 2025 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Solarwinds
Solarwinds web Help Desk
CPEs cpe:2.3:a:solarwinds:web_help_desk:*:*:*:*:*:*:*:*
Vendors & Products Solarwinds
Solarwinds web Help Desk

Tue, 10 Dec 2024 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Dec 2024 08:30:00 +0000

Type Values Removed Values Added
Description SolarWinds Web Help Desk was susceptible to a local file read vulnerability. This vulnerability requires the software be installed on Linux and configured to use non-default development/test mode making exposure to the vulnerability very limited.
Title SolarWinds Web Help Desk Local File Read Vulnerability
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SolarWinds

Published:

Updated: 2024-12-10T19:53:27.023Z

Reserved: 2024-09-05T08:28:03.887Z

Link: CVE-2024-45709

cve-icon Vulnrichment

Updated: 2024-12-10T19:53:22.611Z

cve-icon NVD

Status : Analyzed

Published: 2024-12-10T09:15:06.013

Modified: 2025-02-25T17:20:37.920

Link: CVE-2024-45709

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.