{"id":164270,"date":"2024-06-07T21:37:24","date_gmt":"2024-06-07T21:37:24","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=164270"},"modified":"2024-06-07T21:37:26","modified_gmt":"2024-06-07T21:37:26","slug":"solarwinds-flaws-serv-u-platform","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/164270\/security\/solarwinds-flaws-serv-u-platform.html","title":{"rendered":"SolarWinds fixed multiple flaws in Serv-U and SolarWinds Platform"},"content":{"rendered":"
<\/div>\n

SolarWinds addressed multiple vulnerabilities in Serv-U and the SolarWinds Platform, including a bug reported by a pentester working with NATO.<\/h2>\n\n\n\n

SolarWinds announced security patches to address multiple high-severity vulnerabilities in Serv-U and the SolarWinds Platform. The vulnerabilities affect Platform 2024.1 SR 1 and previous versions.<\/p>\n\n\n\n

One of the vulnerabilities addressed by the company, tracked as CVE-2024-28996, was reported by a penetration tester working with NATO.<\/gwmw><\/gwmw><\/p>\n\n\n\n

The flaw CVE-2024-28996 (CVSS score 7.5) was discovered by NATO Communications and Information Agency pentester Nils Putnins. The flaw is a read-only subset of SQL, SWQL, which allows users to query the SolarWinds database for network information. According to the advisory, the attack complexity is high.<\/p>\n\n\n\n

The company also addressed multiple vulnerabilities in third-party companies. The flaws, tracked as CVE-2024-28999 (CVSS score 6.4) and CVE-2024-29004 (CVSS score 7.1), are a race condition issue and a stored XSS bug in the web console, respectively.<\/gwmw><\/p>\n\n\n\n

The company fixed multiple bugs in third-party components, such as Angular, the public API function BIO_new_NDEF, the OpenSSL RSA Key generation algorithm, and the x86_64 Montgomery squaring procedure in OpenSSL.<\/p>\n\n\n\n

The company released version 2024.2<\/a> that addressed the above vulnerabilities.<\/p>\n\n\n\n

It is unclear if any of these flaws have been exploited in attacks in the wild. <\/gwmw><\/p>\n\n\n\n

Pierluigi\u00a0Paganini<\/strong><\/a><\/gwmw><\/gwmw><\/p>\n\n\n\n

Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/a><\/p>\n\n\n\n

(<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking,\u00a0SolarWinds<\/a>)<\/strong><\/gwmw><\/p>\n","protected":false},"excerpt":{"rendered":"

SolarWinds addressed multiple vulnerabilities in Serv-U and the SolarWinds Platform, including a bug reported by a pentester working with NATO. SolarWinds announced security patches to address multiple high-severity vulnerabilities in Serv-U and the SolarWinds Platform. The vulnerabilities affect Platform 2024.1 SR 1 and previous versions. One of the vulnerabilities addressed by the company, tracked as […]<\/p>\n","protected":false},"author":1,"featured_media":115989,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3323,55],"tags":[4112,9508,9506,10918,687,841,1533,7622],"class_list":["post-164270","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-breaking-news","category-security","tag-hacking","tag-hacking-news","tag-information-security-news","tag-it-information-security","tag-pierluigi-paganini","tag-security-affairs","tag-security-news","tag-solarwinds"],"yoast_head":"\n杭州江阴科强工业胶带有限公司