HomeVulnerabilitySolarWinds Releases Patch for Vital Flaw in Net Assist Desk Software program

SolarWinds Releases Patch for Vital Flaw in Net Assist Desk Software program

SolarWinds has launched patches to deal with a important security vulnerability in its Net Assist Desk software program that may very well be exploited to execute arbitrary code on prone situations.

The flaw, tracked as CVE-2024-28986 (CVSS rating: 9.8), has been described as a deserialization bug.

“SolarWinds Net Assist Desk was discovered to be prone to a Java deserialization distant code execution vulnerability that, if exploited, would permit an attacker to run instructions on the host machine,” the corporate mentioned in an advisory.

“Whereas it was reported as an unauthenticated vulnerability, SolarWinds has been unable to breed it with out authentication after thorough testing.”

The flaw impacts all variations of SolarWinds Net Assist Desk together with and previous to 12.8.3. It has been addressed in hotfix model 12.8.3 HF 1.

Cybersecurity

The disclosure comes as Palo Alto Networks patched a high-severity vulnerability affecting Cortex XSOAR that might end in command injection and code execution.

Assigned the CVE identifier CVE-2024-5914 (CVSS rating: 7.0), the shortcoming impacts all variations of Cortex XSOAR CommonScripts earlier than 1.12.33.

See also  Home windows 10 KB5037768 replace launched with new options and 20 fixes

“A command injection subject in Palo Alto Networks Cortex XSOAR CommonScripts Pack permits an unauthenticated attacker to execute arbitrary instructions throughout the context of an integration container,” the corporate mentioned.

“To be uncovered, an integration should make use of the ScheduleGenericPolling or GenericPollingScheduledTask scripts from the CommonScripts pack.”

Additionally addressed by Palo Alto Networks are two moderate-severity points listed beneath –

  • CVE-2024-5915 (CVSS rating: 5.2) – A privilege escalation (PE) vulnerability within the GlobalProtect app on Home windows units that allows an area person to execute applications with elevated privileges
  • CVE-2024-5916 (CVSS rating: 6.0) – An data publicity vulnerability in PAN-OS software program that allows an area system administrator to entry secrets and techniques, passwords, and tokens of exterior techniques

Customers are advisable to replace to the newest model to mitigate potential dangers. As a precautionary measure, it is also suggested to revoke the secrets and techniques, passwords, and tokens which can be configured in PAN-OS firewalls after the improve.

See also  Easy methods to Keep Secure from Insider & Consumer Offboarding Dangers

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular