Cyber Posture

CVE-2024-28988

CriticalRCE

Published: 01 September 2025

Published
01 September 2025
Modified
14 November 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0799 92.1th percentile
Risk Priority 24 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-28988 is a critical-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Solarwinds Web Help Desk. Its CVSS base score is 9.8 (Critical).

Operationally, ranked in the top 7.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates CVE-2024-28988 by requiring timely remediation of the Java deserialization RCE flaw through application of the vendor patch WHD-12-8-3-Hotfix-3.

prevent

Prevents unauthenticated remote exploitation of the deserialization vulnerability by validating and sanitizing untrusted network inputs to reject malicious serialized objects.

prevent

Mitigates unauthenticated remote network access to the vulnerable SolarWinds Web Help Desk by enforcing boundary protections that limit exposure to external attackers.

NVD Description

SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. This vulnerability was found by the ZDI team after…

more

researching a previous vulnerability and providing this report. The ZDI team was able to discover an unauthenticated attack during their research. We recommend all Web Help Desk customers apply the patch, which is now available. We thank Trend Micro Zero Day Initiative (ZDI) for its ongoing partnership in coordinating with SolarWinds on responsible disclosure of this and other potential vulnerabilities.

Deeper analysisAI

CVE-2024-28988 is a Java Deserialization Remote Code Execution vulnerability (CWE-502) in SolarWinds Web Help Desk. The flaw enables an attacker to execute arbitrary commands on the affected host machine if successfully exploited. It was discovered by the Trend Micro Zero Day Initiative (ZDI) team during research into a prior vulnerability, where they identified an unauthenticated attack vector.

An unauthenticated attacker can exploit this vulnerability remotely over the network with low complexity and no user interaction required, as reflected in its critical CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Successful exploitation grants high-impact remote code execution, potentially compromising the host system.

SolarWinds advisories recommend that all Web Help Desk customers apply the available patch immediately, specifically WHD-12-8-3-Hotfix-3. The vendor thanks ZDI for coordinating responsible disclosure of this and other potential issues.

Details

CWE(s)

Affected Products

solarwinds
web help desk
12.8.3 · ≤ 12.8.2

CVEs Like This One

CVE-2025-40553Same product: Solarwinds Web Help Desk
CVE-2025-26399Same product: Solarwinds Web Help Desk
CVE-2025-40551Same product: Solarwinds Web Help Desk
CVE-2025-40536Same product: Solarwinds Web Help Desk
CVE-2025-40554Same product: Solarwinds Web Help Desk
CVE-2025-40537Same product: Solarwinds Web Help Desk
CVE-2025-40552Same product: Solarwinds Web Help Desk
CVE-2026-28298Same product class: network monitoring / SIEM
CVE-2026-28297Same product class: network monitoring / SIEM
CVE-2025-40539Same product class: network monitoring / SIEM

References