EXECUTIVE SUMMARY:
SolarWinds Web Help Desk is affected by an unauthenticated AjaxProxy deserialization vulnerability that allows remote attackers to execute arbitrary commands on the underlying server, effectively enabling full system compromise if exposed to untrusted networks. This issue is a patch-bypass instance that undermines earlier fixes and highlights the continued risk of deserialization flaws in exposed service components; SolarWinds has released a hotfix for Web Help Desk. Administrators should immediately stop Web Help Desk, back up and replace the affected JAR files with those supplied in the hotfix and restart the service. Additionally, organizations should ensure instances are not directly internet-facing, apply network segmentation and layered defenses, and verify the hotfix installation across all exposed instances.
RECOMMENDATION:
REFERENCES:
The following reports contain further technical details: