CVE-2024-28987
SolarWinds Web Help Desk vulnerability analysis and mitigation

Overview

The SolarWinds Web Help Desk (WHD) software was found to contain a hardcoded credential vulnerability identified as CVE-2024-28987. This critical vulnerability allows remote unauthenticated users to access internal functionality and modify data within the system. The vulnerability affects WHD version 12.8.3 HF1 and all previous versions, with a fix available in version 12.8.3 HF2. The vulnerability was discovered in August 2024 and received a Critical CVSS score of 9.1 (SolarWinds Advisory, Horizon3 Research).

Technical details

The vulnerability stems from hardcoded developer login credentials embedded directly in the code, specifically "helpdeskIntegrationUser" and "dev-C4F8025E7". Unlike other credentials that are retrieved from global declarations in AppProperties, these credentials were directly referenced in the code. The vulnerability exists in the OrionTicketController, which extends the BasicAuthRouteController for performing authentication, and notably has no restrictions on the requesting IP address being localhost like many other controllers enforce (Horizon3 Research).

Impact

The vulnerability enables unauthorized access to help desk ticket details, which often contain sensitive information such as passwords from reset requests and shared service account credentials. This is particularly concerning as WHD is used across government, education, healthcare, nonprofit, and telecommunications sectors (The Register).

Mitigation and workarounds

SolarWinds has released version 12.8.3 Hotfix 2 (HF2) to address this vulnerability. Organizations are strongly advised to upgrade to this version immediately. The patch must be manually installed, and after application, requests to non-existent pages on patched instances will return no content with content-length 0 (SolarWinds Advisory).

Community reactions

The discovery of this vulnerability has raised particular concern given SolarWinds' previous security incidents, including the notorious Russian spy campaign that compromised their Orion software. The security community has emphasized the urgency of patching this vulnerability, with researchers and security firms strongly recommending immediate remediation (The Register).

Additional resources


SourceThis report was generated using AI

Related SolarWinds Web Help Desk vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-26399CRITICAL9.8
  • SolarWinds Web Help DeskSolarWinds Web Help Desk
  • cpe:2.3:a:solarwinds:web_help_desk
NoNoSep 23, 2025
CVE-2024-28987CRITICAL9.1
  • SolarWinds Web Help DeskSolarWinds Web Help Desk
  • cpe:2.3:a:solarwinds:web_help_desk
YesYesAug 21, 2024
CVE-2024-28989MEDIUM5.5
  • SolarWinds Web Help DeskSolarWinds Web Help Desk
  • cpe:2.3:a:solarwinds:web_help_desk
NoYesFeb 11, 2025
CVE-2024-45709MEDIUM5.5
  • SolarWinds Web Help DeskSolarWinds Web Help Desk
  • cpe:2.3:a:solarwinds:web_help_desk
NoYesDec 10, 2024
CVE-2025-26400MEDIUM5.3
  • SolarWinds Web Help DeskSolarWinds Web Help Desk
  • cpe:2.3:a:solarwinds:web_help_desk
NoNoJul 29, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management