CVE-2024-45709
SolarWinds Web Help Desk vulnerability analysis and mitigation

Overview

SolarWinds Web Help Desk (WHD) was identified with a local file read vulnerability (CVE-2024-45709), discovered on December 10, 2024. The vulnerability affects WHD versions 12.8.3 HF3 and prior, with the issue being resolved in version 12.8.4. This security flaw specifically impacts installations on Linux systems that are configured to use non-default development/test mode, which significantly limits the potential exposure (Vendor Advisory, Release Notes).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 5.3 (Medium) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N. The vulnerability is classified as CWE-22, which refers to 'Improper Limitation of a Pathname to a Restricted Directory (Path Traversal)'. The technical assessment indicates that while the vulnerability is network-accessible, it requires high attack complexity and user interaction, with potential impacts limited to confidentiality breaches (NVD).

Impact

The vulnerability allows unauthorized access to read local files on affected systems. However, the impact is significantly constrained by two key factors: the requirement for the software to be installed specifically on Linux systems, and the necessity for the system to be configured in non-default development/test mode (Vendor Advisory).

Mitigation and workarounds

SolarWinds has addressed this vulnerability by releasing version 12.8.4 of Web Help Desk. Users of affected versions (12.8.3 HF3 and prior) are advised to upgrade to the fixed version 12.8.4 to mitigate the risk (Release Notes).

Community reactions

The vulnerability was responsibly disclosed by security researcher Harsh Jaiswal from Project Discovery, demonstrating effective collaboration between security researchers and SolarWinds in addressing security concerns (Vendor Advisory).

Additional resources


SourceThis report was generated using AI

Related SolarWinds Web Help Desk vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-26399CRITICAL9.8
  • SolarWinds Web Help DeskSolarWinds Web Help Desk
  • cpe:2.3:a:solarwinds:web_help_desk
NoNoSep 23, 2025
CVE-2024-28987CRITICAL9.1
  • SolarWinds Web Help DeskSolarWinds Web Help Desk
  • cpe:2.3:a:solarwinds:web_help_desk
YesYesAug 21, 2024
CVE-2024-28989MEDIUM5.5
  • SolarWinds Web Help DeskSolarWinds Web Help Desk
  • cpe:2.3:a:solarwinds:web_help_desk
NoYesFeb 11, 2025
CVE-2024-45709MEDIUM5.5
  • SolarWinds Web Help DeskSolarWinds Web Help Desk
  • cpe:2.3:a:solarwinds:web_help_desk
NoYesDec 10, 2024
CVE-2025-26400MEDIUM5.3
  • SolarWinds Web Help DeskSolarWinds Web Help Desk
  • cpe:2.3:a:solarwinds:web_help_desk
NoNoJul 29, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management