While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing.
However, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
All SolarWinds Web Help Desk customers are advised to upgrade to the latest version of the SolarWinds Web Help Desk 12.8.3 HF 1
Workaround
No workaround given by the vendor.
Wed, 22 Oct 2025 08:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 22 Oct 2025 05:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 22 Oct 2025 04:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 11 Feb 2025 04:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Sat, 17 Aug 2024 00:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Solarwinds web Help Desk
|
|
| CPEs | cpe:2.3:a:solarwinds:web_help_desk:*:*:*:*:*:*:*:* cpe:2.3:a:solarwinds:web_help_desk:12.8.3:-:*:*:*:*:*:* |
|
| Vendors & Products |
Solarwinds web Help Desk
|
Fri, 16 Aug 2024 03:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Solarwinds
Solarwinds webhelpdesk |
|
| CPEs | cpe:2.3:a:solarwinds:webhelpdesk:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Solarwinds
Solarwinds webhelpdesk |
|
| Metrics |
ssvc
|
Thu, 15 Aug 2024 02:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SolarWinds Web Help Desk was susceptible to a Java Deserialization Remote Code Execution that would allow access to run commands on the host machine. | SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing. However, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available. |
Wed, 14 Aug 2024 21:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing. However, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available. | SolarWinds Web Help Desk was susceptible to a Java Deserialization Remote Code Execution that would allow access to run commands on the host machine. |
Wed, 14 Aug 2024 08:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SolarWinds Web Help Desk was susceptible to a Java Deserialization Remote Code Execution that would allow access to run commands on the host machine. | SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing. However, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available. |
Wed, 14 Aug 2024 07:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SolarWinds Web Help Desk was susceptible to a Java Deserialization Remote Code Execution that would allow access to run commands on the host machine. | |
| Title | SolarWinds Web Help Desk Java Deserialization Remote Code Execution Vulnerability | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SolarWinds
Published:
Updated: 2025-10-21T22:55:47.324Z
Reserved: 2024-03-13T20:27:09.782Z
Link: CVE-2024-28986
Updated: 2024-08-15T14:35:07.979Z
Status : Analyzed
Published: 2024-08-13T23:15:16.627
Modified: 2025-10-27T17:01:47.020
Link: CVE-2024-28986
No data.
OpenCVE Enrichment
No data.