The Cybersecurity and Infrastructure Security Agency (CISA) responded promptly by adding this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, emphasizing the need for immediate action. SolarWinds’ Web Help Desk is a popular tool used by small to mid-sized businesses and enterprises with remote workers, making the potential impact of this vulnerability particularly widespread.
SolarWinds noted in their advisory that while the vulnerability was reported as unauthenticated, their internal testing was unable to replicate the issue without prior authentication. Despite this, the company strongly recommends that all users apply the provided hotfix to mitigate any potential risk. It’s important to note that organizations using Security Assertion Markup Language (SAML) for single sign-on should avoid applying the patch until a new fix is released specifically for that configuration.
The affected versions of SolarWinds Web Help Desk include 12.8.3 and earlier. SolarWinds is actively working on additional patches and advises users to stay updated on any new developments to ensure their systems are secure.
Source: Cybersecurity Dive
The European Cyber Intelligence Foundation is a nonprofit think tank specializing in intelligence and cybersecurity, offering consultancy services to government entities. To mitigate potential threats, it is important to implement additional cybersecurity measures with the help of a trusted partner like INFRA www.infrascan.net, or you can try yourself using check.website.